The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
How to effectively locate a file in the emerging cyber, physical, and social systems is becoming a very important challenge due to the convergence of everyday life devices. A typical scenario goes like this. If you do not remember anything about a file (such as keywords or some text in the document) except some fragmented memories of what you are looking for, how can you locate the target in one of...
Monitoring cognitive workload from speech signals has received a lot of attention from researchers in the past few years as it has the potential to improve performance and fidelity in human decision making. The bulk of the research has focused on classifying speech from talkers participating in cognitive workload experiments using simple reading tasks, memory span tests and the Stroop test, typically...
In this paper we study the correlation of node failures in time and space. Our study is based on measurements of a production high performance computer over an 8-month time period. We draw possible types of correlations between node failures and show that, in many cases, there are direct correlations between observed node failures. The significance of such a study is twofold: achieving a clearer understanding...
In this paper we study the correlation of node failures in time and space. Our study is based on measurements of a production high performance computer over an 8-month time period. We draw possible types of correlations between node failures and show that, in many cases, there are direct correlations between observed node failures. The significance of such a study is twofold: achieving a clearer understanding...
Keyloggers is the action of recording the key stroke on a keyboard, typically in a covert manner. Software Keyloggers are detected based on the behavioral characteristics. They don't provide root privileges; detection is based on permission from kernel and prone to many attacks. Software Keyloggers is a software program that can be installed onto a computer, which monitors all the user activities...
This paper presents methodology and theoretical bases of image-cluster method of data structuring of multiparameter objects monitoring of interactive computer systems. Models of Markov transitions of quasi-stationary objects, matrix estimations of normalized cross-correlation coefficients and matrixes of cluster transitions probability, global dispersion and entropy correlative measure of quasi-stationary...
In automated video surveillance applications, detection of suspicious human behaviour is of great practical importance. However due to random nature of human movements, reliable classification of suspicious human movements can be very difficult. Defining an approach to the problem of automatically tracking people and detecting unusual or suspicious movements in Closed Circuit TV (CCTV) videos is our...
The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based...
Large size cluster management is a complex and difficult task. In this paper, we firstly discuss distributed hierarchical autonomic management mechanisms including the framework of distributed hierarchical autonomic management system and functions of each its component. And then we design and realize a high-performance cluster management system DHAView. It has autonomic management features such as...
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavior sequence analysis and the high false negatives. For this situation, this paper proposes a malicious code detection method based on least-squares estimation. In this method, it correlates...
Detecting and identifying security events to provide cyber situation awareness has become an increasingly important task within the network research and development community. We propose a graph similarity-based approach to event detection and identification that integrates a number of techniques to collect time-varying situation information, extract correlations between event attributes, and characterize...
In this paper, a novel Bot detection algorithm for Windows system based on API call correlation was proposed. the coefficient of product-moment correlation was utilized to calculate the correlation of different API calls. More other activities were correlated as well as keylogging. According to the characteristics of different Bot activities with API calls, the membership of different activities were...
The monitoring data for water quality of Beijing Beihai between May and October in 2007 have been analyzed with gray correlation. In order to overcome the defects of the traditional method, this way consider the interzone form of the water quality evaluation standard, use centralization dimensionless functions, and combine the integrated nutritional status index with const weight. The thread system...
As a kind of invisible spyware that records user's keystrokes, software keyloggers have posed a great threat to user privacy and security. It is difficult to detect keyloggers because they run in a hidden mode. In this paper, an immune-inspired dendritic cell algorithm (DCA) was used to detect the existence of keyloggers on an infected host machine. The basis of the detection is facilitated through...
This research paper purposes to develop a technology attendance tool, based on CAMTs and CARs. The paper itself briefly describes the importance of using technology-based research results in university settings regarding the improvement of student attendance. The importance of this topic explained first, by selecting some research results found in an experimental research study on student attendance...
Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical way is to compare an incoming connection with outgoing connections to determine if a computer is used as a stepping-stone. In this paper, we present a way by using signal processing technology-correlation coefficient, such...
It is an important issue to understand the mechanism of personal opinion expression and consensus building in communities. We implemented an interactive application called ldquofuture chroniclerdquo for monitoring personal opinion expression and consensus building in communities. Future chronicle produces the field of personal opinion expression from multiple users, and users can share their thoughts...
We assessed the effects of the addition of dynamic visual elements and sounds to a levee patroller training game on the appraisal of the environment and weather conditions, the engagement of the users and their performance. Results show that the combination of visual dynamics and sounds best conveys the impression of severe weather conditions and most strongly influences the appraisal of the environment...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
A high bandwidth critical path monitor (1 sample/ cycle at 4-5 GHz) capable of providing real-time timing margin information to a variable voltage/frequency scaling control loop is described. The critical path monitor tracks the critical path delay to within 1 FO2 inverter delay with a standard deviation less than 3 FO2 delays over process, voltage, temperature, and workload. The CPM is sensitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.