The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related...
Protecting Critical Infrastructures (CIs) against contemporary cyber attacks has become a crucial as well as complex task. Modern attack campaigns, such as Advanced Persistent Threats (APTs), leverage weaknesses in the organization's business processes and exploit vulnerabilities of several systems to hit their target. Although their life-cycle can last for months, these campaigns typically go undetected...
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally implemented over wireless networked control systems (WNCS). The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through...
This study examined the hypothetical model of job security, job satisfaction, and perceived safety, as antecedences for driving behavior. Data collection from 360 motorcyclists, as survey respondent, in Jakarta, utilized purposive-sampling technique, with four instruments which reliabilities were calculated using Cronbach's Alpha. The goodness of fit and the validity of the Hypothetical model were...
It is very challenging to secure industrial control systems from malwares and protect the system under control. Recent malwares have been specifically targeting public infrastructures like power grids/plants. Protecting against these malwares is challenging as they are configured with deep knowledge of the controller and system under control. Industrial plants are complex systems and hence needs a...
Correlation between the legitimate receiver and the eavesdropper has been seldom considered in the literature when evaluating secrecy metrics in stochastic wireless networks. In practice, however, poor scattering conditions may lead to spatially correlated channels, which can be exploited by eavesdroppers. In this paper we investigate the connection outage and secrecy outage in Poisson-distributed...
Under the considerations of trading costs and efficiency, more and more investors choose the way of online stock trading which is fast, convenient, and has preferential fee. The cost of establishing a new customer is five times more than maintaining an old one. As a result, to explore the investors choose continuous usage behavior of online security trading system as reference for security industry...
We determine an opportune time to rebalance a two-asset portfolio set up using the single period Markowitz framework. This is achieved by studying and comparing the nature of portfolio evolution when two extreme rebalancing strategies are used, viz. passive or buy-and-hold and active or continuous rebalancing. We compute the rebalance time as the period during which the passive strategy generates...
There is a growing concern across the globe about exfiltration of sensitive data over network. This coupled with the increase in other insider threats pose greater challenge. Present day perimeter security solutions such as Intrusion detection & prevention system, firewall are not capable of detecting data-exfiltration. Also existing behavior models that can detect intrusions and worms do not...
Management is the management holding the owner of a listed company, holding shares of listed companies, in order to address the separation of ownership and management under the conditions of management incentives. In this paper, annual reports of listed companies in China in recent years, the disclosure of shareholdings and corporate performance management for the study of managerial ownership and...
In recent years, research for bank efficiency has became a most important topic of financial industry and regulatory authorities. China's banking industry has experienced large-scale shareholding reform since 2003, and has gone through the global financial crisis began in 2008, now it is facing the challenges and competition from opening-door policy in banking business. Under this background, this...
The issue of the separation of ownership from control and the alignment of management and shareholder via the managerial ownership of equity remain the key topic of Chinese listed companies. Through the empirical study, this paper reveals that the managerial shareholding has no effect on management performance. The fundamental resolution to get the stock option incentive work in China is to set up...
We develop a sequential experiment design procedure to construct multiple metamodels based on a single stochastic simulation model. We apply the procedure to approximate many securities' prices as functions of a financial scenario. We propose a cross-validation method that adds design points and simulation effort at the design points to target all metamodels' relative prediction errors. To improve...
A new index system of commercial bank liquidity stress testing is set up after cluster analysis of R type. And then the index weight is determined by entropy method. Commercial bank liquidity risk is rated. Taking 14 listed banks for example, rating liquidity risk. The innovative feature of this paper: Firstly, observable indices replace unobservable ones, it is feasible for banks to ensure liquidity...
The development of state-owned economy reflects China's socialist public ownership, and plays an important role in ensuring the safety of state-owned capital, which is conducive to realizing the country's fundamental interests. Through the analysis of the relationship between internal control and the security of the state capital, the effectiveness of internal control is beneficial to the increase...
The ideas of cutting down interest rates to curb savings and promoting consumption is important for the implementation of macroeconomic policies. This paper establishes savings rate regression model and analyses the influence of interest rates on China's household savings since 1988. The study has found the impact of interest rates on household savings is uncertain, so it will be over-simplified if...
In the open distributed environment, the knowledge of belief is absent for the entity with which we will contact, so the recommendation trust is very important for the distributed system. In this paper a recommendation trust model is proposed based on encouragement and punishment. In the model, the trust value of any entity consists of trading reputation value and recommendation reputation value,...
Social unconventional emergencies not only bring disaster to human life and living environment, but also cause losses to the country and the people. What's more, their occurrence tends to cause series of chain reactions and inspire lots of social problems, thus likely to break the social balance, and lead to national instability and social disharmony. In this paper, "concern degree model"...
It has been proposed recently an approach to generate secret key exploiting reactance-domain scalar response of multipath fading channel. However, the security of the shared key has not been adequately investigated. In this paper we propose a mathematical model of the key distribution protocol based on the use of a Variable-Directional Antenna (VDA) acting on multipath wireless channels. The security...
In 2008, 90 million citizens in the United States used electronic tax filing to submit their federal tax returns. Yet these adopters represent only a subset of the population. Citizen concerns regarding the security of this electronic option still serve as a barrier to e-file adoption. In this study, we propose a model of e-file adoption that integrates technology acceptance, optimism bias, reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.