The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from...
With growing popularity of online services, the amount of information on web increases dramatically, which has resulted in increasingly concerns on web application security. Subject knowledge is in desperate need to guide security testing against advanced attacks. Unlike common software security weakness study pattern, a combination analysis method based on Colored Petri Net is presented in this paper...
This paper presents a classify model of learning behavior on an intelligent tutoring website which provides a describing method of learning behavior. MFR Model creates a conceptual model and a analysis model according to students' learning behavior on the website. By using MFR model, influences of participation and learning effects can be judged by learning behavior which can not only strengthen the...
Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key management protocol. Most of the reported key management protocols follow either a centralized approach where a single node has the authority of distributing the global shared key, or a partially collaborative approach where key distribution is...
In the process of collaborative design, a large number of versions are produced. Storing and accessing versions is very frequent, so version storage in the process of collaborative design has become the core issue of version management. In recent years, how to reduce the storage space and improve the retrieval efficiency has become a research hotspot, however the research of version security is still...
Many commonly used liquidity measures are based on snapshots of the state of the limit order book (LOB) and can thus only provide information about instantaneous liquidity, and not regarding the local liquidity regime. However, trading in the LOB is characterised by many intra-day liquidity shocks, where the LOB generally recovers after a short period of time. In this paper, we capture this dynamic...
One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a...
Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.
The open applications makes P2P network has many security problems. In order to improve the performance of network, and to ensure the quality of services, this paper proposes a trust model for fault-tolerant and intrusion-tolerant Mechanism of P2P networks. In this model, a new trust evaluation and management mechanism have been studied, and an updating method of the trust degree has been described...
Security of web-based systems still remains a key challenge for most IT executives, for software is vulnerable at various stages and most severely weakened in the operational environment. In the past, models and tools or even design techniques have been devised to tackle this challenge. But we still see the reemergence of the same security issues that afflict both traditional and modern web-based...
To achieve security in distributed wireless sensor networks, one of the most promising approaches is the so-called random pre-distribution of key seeds. Pair-wise secure communication channels between nodes were established or discovered by using key information that were constructed and pre-distribution to each node in distributed wireless sensor networks. Combining DNA model with the idea of multiple...
Recent years, Chinese people pay much attention on the health security system. We make efforts to help the government to analyze the health security system of all parts of the country. In our paper, we utilize two models, Factor Analysis (FA) and Gray Relation Analysis (GRA), to evaluate the health security system from both time-vertical and place-horizontal aspects. FA is a fantastic model when objects...
This paper presents and discusses a conceptual framework designed to analyze how higher education institutions are using advanced communication technologies to support learning. The focus is on the institutional perspective and the paper includes a review of literature and a proposal of a model of analysis, supported by two main concepts -- institutional framework and use, whose dimensions and components...
Cyberspace situation awareness (CSA) is the base of cyberspace operations (CO). A right decision of CO is based on the correct awareness of the cyberspace situation. The paper analyzes two classical models, and then takes account of the characteristics of cyberspace operations, finally proposes a hierarchical, multi-perspectives model. The model employs three perspectives and four layers. The model...
This paper uses Analytic Hierarchy Process(AHP) to analyze the probability of individual appearing acts of violence by the influence of different roles in the crowd of Mass Violence Event, obtaining the weight of influence of organization leaders, agitators, general participants and bystanders to individuals. This paper also introduces spatial heterogeneity to reflect different roles' influence decaying...
This paper introduces a new method for analyzing Mass Violence Events, and then we make use of Intelligent Artificial and Agent-Based System to deal with them. In the meanwhile, we describe and defy three kinds of agents (cops, activists and civilians), what comes next is that we apply these theories to model and simulate such events. The simulation results show that the behaviors of activists can...
According to the characteristics of trust in the alliance interoperable environment and the shortcomings of the existing trust model, we propose a recommendation trust model based on reputation — RBRTrust Model, the model took into account the subjective and objective factors which impact the trust: interactive scope, interactive time, interactive context, etc., through local trust, direct trust and...
In order to evaluate the risks of information system, the paper proposed an information system grey evaluation model from the concept of “grey degree” and this can reduce the subjectivity of the evaluators. Fuzzy-AHP method was used to ensure the objectivity of the weight selection. The demonstration research proves the method is effectively.
Software requirements, especially non-functional requirements, are considered as vital prerequisites for producing software of high quality. As widely accepted, non-functional goal modeling like the NFR Framework usually employs tree modeling style, and presents an interactive process for the analysis of nonfunctional requirements. However, there still exist some problems during the identification...
An expected utility model is proposed to measure the utility toward fuzzy wealth. Some properties and concepts, such as certainty equivalence are analyzed. Based on maximizing the expected utility, some models are given to consider how to form an optimal portfolio: the first problem on investing in a crisp asset and an uncertainty asset with fuzzy value, the second problem on investing in a set of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.