The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we demonstrate a model of quantitative risk analysis, where...
It is necessary to implementation of system contain intelligent decision making algorithm considering marine feature because existing vessel USN system is simply monitoring obtained data from vessel USN. In this paper, we designed inference system using case based reasoning method and implemented knowledge base that case for fire and damage risk of digital marine vessel. We used K-Nearest Neighbor...
Today, the Internet technology development and their applications have become increasingly popular. Hence, the WWW technology brings the rising of Enterprise Information Portal (EIP). However, providing a secure Enterprise Information Portal is one of essential quality of services (QoS) in Internet applications. Focusing on the security of EIP, the purposes of this paper are to find out various risk...
The Reservoir Induced Seismicity and Risk Assessment System (RISaRiskAS 2007 for Window) is developed specially for the reservoir induced earthquake data management, the information query, the maximum magnitude prediction, the potential seismic hazard and risk assessment. As strong functions of processing, the system can be used for the research of reservoir induced seismicity, the decision-making...
Comparing risks of rare, high consequence events poses serious challenges to social decision making as well as deep methodological and epistemological problems. It is necessary to assess the merits of countermeasures that are only useful in extremely unlikely circumstances. The value of a conventional conditional probability P(A|B)=P(A∩B)/P(B) becomes too uncertain to be useful when P(B) is not well...
It is very important to assess the impact of risk on decisions during the development of products or systems. The traditional way tends to make predictions quantitatively for the product design and manufacture phases but not to extend them to the service phase. This research presents a novel application of simulation to modeling the whole life cycle of a product and imitating the behavior and characteristics...
In view of the shortage of e-commerce sites for data mining system, Web data mining system framework based on mobile agent is proposed in this paper. In advantage of the independency, mobility and intelligence of mobile agent, the search process and the recommendation of the entire commodity have a higher timeliness and accuracy. Businesses can apply the information to analyze and predict future behavior...
In this paper, we present an end-user tool called the privacy protection framework (P2F) which aims to support users in protecting their privacy when obtaining Web-based services. P2F acts as a recommendation tool that analyzes the user's transaction history and privacy preferences in addition to real-world privacy guidelines to prevent undesirable disclosure of personal data. The framework is based...
This paper first carry out the summary to the information security risk assessment's present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frame's information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank system's example, proved this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.