The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To solve the problem of multi-UAV collision avoidance, propose the solution framework of multi-UAV collision avoidance based on the reinforcement learning. Firstly, four elements of state space, action space, the environment model and return value in the multi UAV cooperative collision avoidance problem were analyzed in depth. For the environment model, modeling it from two aspects of the UAV dynamic...
Architecture models mainly have three functions; 1) document, 2) analyze, and 3) improve the system under consideration. All three functions have suffered from being timeconsuming and expensive, mainly due to being manual processes in need of hard to find expertise. Recent work has however automated both the data collection and the analysis. In order for enterprise architecture modeling to finally...
Sophisticated attacks on Energy Delivery Systems (EDS) are no longer theoretical, and instead pose a serious threat to American economies. The EDS community has worked collaboratively to develop security requirements to protect EDS against such attacks, but the documents that contain these requirements are often dense, ambiguous and difficult for humans to understand, resulting in highly subjective...
Software-defined networking (SDN) is a networking paradigm to provide automated network management at run time through network orchestration and virtualization. A central controller realizes the automatic network configuration in SDN at run time by conforming to a control plane protocol (e.g., OpenFlow) and switches act as simple forwarding devices. However, SDN are susceptible to cyber attacks and...
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
The increasing collection and use of sensitive datasets in science, coupled with the need for inter-institutional collaboration, poses new challenges for infrastructure and administrative models. While enclaves, such as CLOUD KOTTA, provide for the secure management and analysis of data, they do not yet support the administrative models needed by today's researcher practices. Current approaches often...
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
The potential of full-duplex in communication design has been recently considered for emerging technologies such as 5G. Moreover, full-duplex can play a crucial role in upcoming secure communication scenarios too. However, results in the literature are limited and only explore scenarios, where the wireless channel is used either for key generation or for secure messaging. Our first contribution is...
Companies willing to survive the numeric economy are forced to collaborate with each other in order to maximize their co-creation of value. This co-creation exists for many reasons: to sell and acquire information, goods and services, to optimize the quality of procedures, to improve security and privacy, etc. In this paper, we analyze and model value co-creation through three dimensions: the value's...
Multi-Criteria Decision Analysis (MCDA) has been used widely to guide decision making in multi-attribute selection problems. Few studies have however proposed the use of combinations of MCDA approaches with goal-oriented modeling to rank design alternatives related to business process models. We propose a distance-based approach for models specified with the Goal-oriented Requirement Language (GRL)...
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
Verifying attacks against cyber physical systems can be a costly and time-consuming process. By using a simulated environment, attacks can be verified quickly and accurately. By combining the simulation of a cyber physical system with a hybrid attack graph, the effects of a series of exploits can be accurately analysed. Furthermore, the use of a simulated environment to verify attacks may uncover...
With the development of information technology, software plays an increasingly important role in the process of social development. However, at the same time, the number of software vulnerabilities is growing, posing a threat to national security and social stability. Therefore, some scholars and research institutions are paying their attention to the study of software vulnerability. In this paper,...
Security vulnerabilities in system software are a major concern, especially when the software is highly exposed. This paper studies whether it is possible to emulate security vulnerabilities through software fault injection by using well known emulation operators. Emulating security vulnerabilities in the C programming language, in a realistic way using field data, is an unanswered research question,...
Banking crime is one of the widespread phenomena in 2016 are closely associated with the used of computer-based technology and internet networks that constantly evolving. One of them is the burglary of customer accounts through the internet banking facility. To overcome this, we need a method of how to detect a conspiracy of bank burglary case of customer accounts. The way to scalable is by get a...
It is largely recognized that the architectures of embedded systems are becoming more and more complex both at hardware and software levels. Despite the significant advances in the development tools, developing the software of such systems while ensuring their safety is still a difficult task. In this paper, we propose an engineering methodology to ease the development of safe software systems. It...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
The relation between Chinese GDP and defense expenditure is investigated based on the data from 1978 to 2015, which is divided into four stages according to national defense development strategy evolution and defense spending growth rate. The results revealed that the absolute degree of grey incidence between defense expenditure and GDP is relatively small, illustrating defense expenditure exerts...
Based on the financial security index calculated in the method of principal component analysis, this paper applies the model of BP neural network to test the result and then puts forward the early warning of Chinese financial security position in the future. In addition, the article gives some following suggestions for the early warning of financial risks: we shall reform the current financial regulation...
In this paper, we construct the financial risk early warning model based on BP neural network, make an empirical analysis of the data between January 2004 and October 2015, proves the reliability of the model prediction results through the training and test of the financial risk early warning model and finally put forward the following suggestions for preventing China's financial risks under the new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.