The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds...
Cloud infrastructures are prone to various anomalies due to their ever-growing complexity and dynamics. Monitoring behavior of dynamic resource management systems is necessary to guarantee cloud reliability. In this paper, we present AMAD, a system designed for detecting an abusive use of dynamic virtual machine migration, in the case of the abusive virtual machine migration attack. This attack is...
This paper presents exact solution methods for analyzing vulnerability of electric power networks to a certain kind of undetectable attacks known as false data injection attacks. We show that the problems of finding the minimum number of measurement points to be attacked undetectably reduce to minimum cut problems on hypergraphs, which admit efficient combinatorial algorithms. Experimental results...
Due to the uncertainty of major influential factors in emergency logistics transportation path optimization, this paper intends to describe those uncertain factors, such as the transportation time, the safety factor and the transportation costs, etc. by using trapezoidal fuzzy numbers. And then the paper establishes a multi-objective optimization model according to the previous described decision-making...
We show how outage shift factors can be used to define a synthetic indicator of node importance in power grids. Such indicator can be combined with other indices to jointly assess the criticality of grid buses as far as robustness with respect to blackouts is concerned. As an example we use it jointly with Electrical Betweenness to select power sources locations in a distributed generation framework...
Cancelable biometrics is an important biometric template protection scheme and can effectively address privacy and security concerns in the case of stored biometric templates being compromised. This paper presents a Hadamard transform-based approach to the design of cancelable fingerprint templates. The proposed cancelable templates are alignment-free and hence do not suffer from inaccurate fingerprint...
In security constrained economic dispatch, the generation is determined such as to minimize cost to supply the load while fulfilling all of the operational constraints in normal operation and contingency cases. The formulation of a security index provides a quantitative measure for the security in the system and also allows for the determination of the impact of generators on security. Hence, in this...
The assessment index system of emergency maintenance guarantee capability at vehicle equipments of armed police force is set up and the principles are put forward. The weight of every index is determined by applying AHP method. Finally, depending on fuzzy mathematics, a comprehensive assessment model of emergency maintenance guarantee capability at vehicle equipments for armed police force is built...
Biometric characteristics are largely immutable, i.e. unprotected storage of biometric data provokes serious privacy threats, e.g. identity theft, limited re-newability, or cross-matching. In accordance with the ISO/IEC 24745 standard, technologies of cancelable biometrics offer solutions to biometric information protection by obscuring biometric signal in a non-invertible manner, while biometric...
Body Area Networks (BANs) are expected to play a major role in patient health monitoring in the near future. Providing an efficient key agreement with the prosperities of plug-n-play and transparency to support secure inter-sensor communications is critical especially during the stages of network initialization and reconfiguration. In this paper, we present a novel key agreement scheme termed Ordered-Physiological-Feature-based...
Along with the implementation of the new rural pension insurance program, it faces a challenge. It is also seems to be very important and meaningful to research and evaluation the intention of farmers. According to the characteristics of the new rural pension insurance program, the intention of the Insured index system is established. And the fuzzy comprehensive evaluation method combining with analytical...
Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.
Weight reflects the essentiality of an index in index volume. Presented a method of determine index weight in security risk evaluation (SRE) based on information entropy. It is a kind of structure analysis method, which constituted entropy model for security risk evaluation of information system and defined subjection function in the first instance, shaped subjection degree matrix of experts' ideas...
In this study we analyze behavior of two types of coefficients for determining the suitable number of clusters obtained when fuzzy cluster analysis is applied. First one is Dunn's coefficient which contains membership degrees in its computational formula; second one is the average silhouette width, used primarily for evaluating hard clustering. There have already been attempts to compare different...
To assure the construction and operation security of the smart grid, it is necessary to assess the real-time operation reliability of the power cables which work in power tunnels by using on-line monitoring data. An online assessment system, which presents the important operating characteristics of the power cables, has been built up based on the following data: some preventive experiments results...
Location and time are two critical aspects of most security-related events, and thus, spatiotemporal data analysis plays a central role in many security-related applications. The human brain has great capabilities of developing invariant representations of objects by taking advantage of both spatial similarity of features of objects/events and their relative timings (temporal information). Trace learning...
In this paper an efficient computation scheme for analyzing the security of power transmission networks is presented. In order to strategically allocate protection devices in the network, the problem of finding the sparsest stealthy false data attack to the state estimator is studied. While the attack search problem is traditionally solved as a generic constrained cardinality minimization problem,...
In order to improve the reliability of network security evaluation, the application of analytical hierarchy process method on the network security assessment was studied in depth. Firstly, the characters of network security were introduced. Secondly, the basic theory of analytic hierarchy process was analyzed, and then the index system of integrated evaluation of network security was established....
Due to the disaster factors that influence the ecological security of Mining cities, risk measurement and fuzzy optimization theories are used, and an assessment indicator system based on potential factors and a fuzzy iteration model about ecological security of Mining Cities are presented in this paper, from the point of safety and disaster concepts. Finally, a case is applied in the appraisal of...
Accounting information system risk analysis and assessment is of more importance in enterprise. In this paper, analytic hierarchy process method and fuzzy comprehensive evaluation model are combined to assess the risk of accounting system. In this way, complex risk factors can be analyzed systematically as while as risk Level can be analyzed quantitatively which is fuzzy. And practice proves that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.