The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the sufficiency of software test, the concept of exception test case is put forward and analyzed by examples firstly in this paper, Secondly, since the obtaining method of exception test cases differs greatly to traditional security test cases, a distributed-storage method is proposed to store and share exception test cases on a P2P network. To realize sharing and reusing of exception...
Buffer overflow vulnerabilities are currently the most prevalent security vulnerability. The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting. By using the method we can identify potential weakness locations. A buffer overflow vulnerabilities testing system was developed. The experiment results tested and...
This thesis carrys out thorough investigation and discussion to the optimum savings ratio of our country economy making use of qualitative analysis. We put forward that the really savings ratio have exceeded the optimum savings ratio needed by balanced growth of our country economy owing to a series of unbalance in economy reality.Then,we built the economic model through demonstration analysis to...
Currently, information appears on the business environment as an active creator of value and benefits [8]. The heavy use of computing resources to process and store the information has heightened the dependency of organizations regarding to their IT infrastructure. This becomes critical when we know that all systems have vulnerabilities that could jeopardize the entire business activity. So, despite...
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer...
The reinforced security strategy can't ensure the survivability of command automation system under information warfare. To solve non-standardized and non-practical problems of present survivability analysis, a practical and operational survivability analysis framework of command automation system is presented on basis of survivability requirements, which is useful for survivability design and assessment...
A large number of non performing assets in financial institutions is an important reason for causation and deterioration of financial crisis. Asset securitization is considered the effective way to deal with NPA. The key issue of restricting securitization is the selection of NPA. Firstly this paper introduced definition and market players of asset securitization. Secondly, it put forward the principles...
Object tracking has gained quite an interest from researchers all over the world. Even though there are numerous approaches to solve the problem of tracking multiple objects in visual clutter, it is still difficult to evaluate and compare the methods with one another, due to the lack of standard database available. Thus, the purpose of this paper is to address this issue and establish a standard database...
Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to deploy new signatures without...
The number of security errors and vulnerabilities can be reduced if a secure software development process (SSDP) is followed. Such a SSDP must cater for security aspects during each phase of development. In this paper, we present a new process that provides ways of addressing security concerns and incorporating security decisions throughout the software development process. Our process has two views:...
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
One of the key points in the evaluation of risks associated to cyber threats in power control systems is how to find enough evidence for assigning probabilities to cyber threat occurrences and consequent failure modes. The paper discusses (i) the possibility of conducting controlled experiments on power control testbeds in order to collect otherwise unavailable data related to cyber misbehaviours...
This paper proposes a new index to better determine the vulnerability of a power system. The procedure for calculating this index combines stochastic and probabilistic methods to determine the likelihood of a line overloading in a power system. The methods used include a basic load flow analysis using network security factors and Monte Carlo simulation that incorporates the likelihood of component...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
Cryptographic devices are recently implemented with different countermeasures against side channel attacks and fault analysis. Moreover, some usual testing techniques, such as scan chains, are not allowed or restricted for security requirements. In this paper, we analyze the impact that error detecting schemes have on the testability of an implementation of the advanced encryption standard, in particular...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palm-print-based verification system by integrating hand geometry features and finger-print features. Unlike other bimodal biometric systems, the users do not have to undergo the inconvenience of using two diferent sensors since the palm-print, finger-print and hand geometry...
We present the use of swept wavelength interferometry for distributed fiber-optic temperature measurements in a nuclear reactor. The sensors consisted of 2-m segments of commercially available, single mode optical fibers. The interrogation technique is based on measuring the spectral shift of the intrinsic Rayleigh backscatter signal along the optical fiber and converting the spectral shift to temperature.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.