The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, based on statistical analysis and hypothesis testing. VoIP networks are a popular, low-cost alternative for telephony that offer lower rates especially for long-distance calls. Other services such as FollowMe, enhance the traditional voice-oriented nature of these networks. Consequently several security...
Advanced Metering Infrastructure (AMI) has evolved to measure and control energy usage in communicating through metering devices. However, the development of the AMI network brings with it security issues, including the increasingly serious risk of malware in the new emerging network. Malware is often embedded in the data payloads of legitimate metering data. It is difficult to detect malware in metering...
Information security risk assessment is essential to government for making an efficient and effective security management plan. This paper firstly established a hierarchy structure index system for E-government information systems security risk assessment based on the operationally critical threat, assets and vulnerability evaluation (OCTAVE). Considering that the previous weights selection methods...
It is important to improve voting system in current software fault tolerance research. In this paper, we propose a hierarchical mixture model voting system (HMMVS). This is an application of the hierarchical mixtures of experts (HME) architecture. In HMMVS, individual voting models are used as experts. During the training of HMMVS, an Expectation-Maximizing (EM) algorithm is employed to estimate the...
Audio signal is an important clue for the situation awareness. It provides complementary information for video signal. For home care, elder care, and security application, screaming is one of the events people (family member, care giver, and security guard) are especially interested in. We present here an approach to scream detection, using both analytic and statistical features for the classification...
A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters submit bug reports to a bug-tracking system, the bug reporters need to label the bug reports as security bug reports (SBRs) or not, to indicate whether the involved bugs are security problems. These SBRs generally deserve higher...
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems,...
Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare...
A Web Services based Online Training and Exam System is introduced and implemented in this paper. The system includes five modules which are System Management Module, Item Bank Management Module, Online Training Module, Online Exam Module and Statistical Analysis Module. And the design idea, the system architecture as well as the realizing methods of the system are also introduced in detail.
The security of biometric template is important for a biometric system's privacy and security. In a traditional biometric system, the template is saved directly in a reference database. This results in a series of security and privacy risks, which limits the development of biometric recognition technique. This paper provides a template protection scheme that is suit for statistic feature-based algorithm,...
Technical analysis is aimed at devising trading rules capable of exploiting short-term fluctuations on the financial markets. The application of genetic programming (GP) as a means to automatically generate such trading rules on the stock markets has been studied. Computational results, based on historical pricing and transaction volume data, are reported for the thirty component stocks of the Dow...
Steganography techniques can be used to convey hidden information. If done well, the information is difficult to discover and is unknown to an observer. The detection of steganography, known as steganalysis, is an important research pursuit. In previous work, we developed a method of steganalysis for images with messages embedded by an LSB plusmn1 scheme. Our method uses lossless image compression...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.