Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
Fraud is increasing with the extensive use of internet and the increase of online transactions. More advanced solutions are desired to protect financial service companies and credit card holders from constantly evolving online fraud attacks. The main objective of this paper is to construct an efficient fraud detection system which is adaptive to the behavior changes by combining classification and...
With the development of the network technology, social network services (SNS), which are based on social network theory have gained increasing media, government and popular attention than ever before. In a social networking site, recommendation and trust assessment is of great importance. However, applications are complicated and changeable, so the fixed assessment criteria which are dedicated to...
By illustrating the classification rules and association rules of data mining and taking into consideration of the content and requirement of third-party logistics information management and analyzing the security problems exist in third-party logistics information management, the paper suggests a safety third-party logistics information management model based on data mining. This model could provide...
The following topics are dealt with: image processing; computer vision; biometrics; biomedical signal processing; data mining; information retrieval; information coding; pattern recognition; document processing; and information system security.
Today E-commerce popularity has made web an excellent source of gathering customer reviews / opinions about a product that they have purchased. The number of customer reviews that a product receives is growing at a very fast rate (It could be in hundreds or thousands). Opinion mining from product reviews, forum posts and blogs is an important research topic today with many applications. However, existing...
Having an accurate Signature Detection Classification (SDC) Model has become highly demanding for Intrusion Detection Systems (IDS) to secure networks, especially when dealing with large and complex security audit data set. Selecting appropriate network features is one of the factors that influence the accuracy of SDC model. Past research has shown that the Hidden Marcov Chain, Genetic Algorithm,...
Security of computers and the networks that connect them is increasingly becoming of great significance. As an effect, building effective intrusion detection models with good accuracy and real-time performance are essential. In this paper we propose a new data mining based technique for intrusion detection using Cost-sensitive classification and Support Vector Machines. We introduced an algorithm...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
The following topics are dealt with: database technology; pattern clustering; data mining; data security; Internet; image processing; neural nets; wireless sensor networks; telecommunications computing; geophysics computing; traffic engineering computing; video signal processing; computer aided instruction; satellite communications; and electronic commerce.
This work presents a novel proposal for incremental intruder detection in collaborative recommender systems. We explore the use of rare association rule mining to reveal the existence of a suspected raid of attackers that would alter the normal behaviour of a rating-based system. In this position paper we have extended our previous G3PARM algorithm, which has already proven to serve as a solid method...
The following topics are dealt with: IDS; routing protocol; requirement engineering; multimedia system; ontology modelling; data mining; neural network; image processing; educational technology; recommender system; query optimization; ad hoc networks; and biological databases.
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability types and new trends semi-automatically. In our study of the 39,393 unique CVEs until the end of 2009, we identify the following trends, given here in the form of a weather forecast: PHP: declining, with occasional SQL injection...
Aiming at the shortages of the existing data-mining model for forecasting the industry security, a classification model based on rough sets and BP neural network (BPNN) is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the BPNN to train and learn. After that, the sorts of the coal industry security...
The following topics are dealt with: microwave filters and antennas; fuzzy logic and neural based approaches; mobile ad hoc network; wireless sensor network; data and web mining; security algorithms; signal processing and communication; digital design and embedded implementations.
This paper explores online learning and batch algorithms for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. A data set has been built including malicious and benign URLs, and data mining system Weka has been used as an aid to classify the existent URLs and new coming URLs and evaluate the classification algorithms. A real-time...
Information Hiding is a good method to transmit important information secretly. Video sequences usually include many frames, so they have more room to hide information. In the paper, in order to increase the amount of hiding information, we choose MPEG sequences as hosts, and we present a practical method to hide information in MPEG compressed video. Generally, there are many B-frames in each GOP...
Intrusion Detection System (IDS) is the key technology to ensure the security of dynamic systems. We employ a sequential pattern mining approach to discover significant system call sequences to prevent malicious attacks. To reduce the computing time of generating meaningful rules, we design a weighted suffix tree structure to detect intrusive events on the fly. The experimental results show our method...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.