The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This manuscript intends to explore the application of a specific secure data environment within different prototypes of information sharing. It focuses on data management with confidence and agility for the exchange of information. Through discussion and examples, the paper explores the landscape surrounding sensitive data sets. In particular, the paper looks at the application of data sharing related...
Compared with other areas, knowledge management in education area has been lack of attention for a long time. This paper did a survey on undergraduate in a Chinese research university. By designing the questionnaire, implementing the survey website by programming, we got 515 original data from art students and science students. Then we analyzed the data by several data-mining algorithms, e.g. the...
The pervasive imbalanced class distribution occurring in real-world stream applications, such as surveillance, security and finance, in which data arrive continuously has sparked extensive interest in the study of imbalanced stream classification. In such applications, the evolution of unstable class concepts is always accompanied and complicated by the skewed class distribution. However, most of...
When individual-level health data is shared in biomedical research the privacy of patients and probands must be protected. This is typically achieved with methods of data de-identification, which transform data in such a way that formal guarantees about the degree of protection from re-identification can be provided. In the process it is important to minimize loss of information to ensure that the...
This paper makes an empirical test on the correlation between financial restatement and audit report lag (ARL) using data of non-financial listed companies in China during the period 2009–2012. The empirical results show that there is a significant positive correlation between financial restatement and ARL. The longer the ARL is, the more likely it is for the company to perform a financial restatement...
We consider the {n, k, d, l) secure exact-repair regenerating code problem, which generalizes the {n, k, d) exact-repair regenerating code problem with the additional constraint that the stored file needs to be kept information-theoretically secure against an eavesdropper, who can access the data transmitted to regenerate a total of l different failed nodes. For all known results on this problem,...
Healthcare has increased its overall value by adopting big data methods to analyze and understand its data from various sources. This article presents big data from the perspective of improving healthcare services and, also, offers a holistic view of system security and factors determining security breaches.
It is believed that technology will take over the day to day life of human begin. No one can remain isolated from the adaptation of technology. Hence it is the need of the hour to introduce a technology which will do the day to day life tasks in human life with smart and intelligent way. Hence, this paper critically discuss the emergence and progress of Internet of Every Things (IoET) as the next...
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
Today's cloud infrastructure is often overwhelmed by inputs from multiple users and administrators for enforcing the policies on which to run cloud services, and infrastructure administrators need to configure policies on different resource types such as compute, network, etc. Such complex policy enforcement decisions from multiple users could result in errors and conflicts. To mitigate such complexities...
Nowadays, many organizations collect large volumes of event log data on a daily basis, and the analysis of collected data is a challenging task. For this purpose, data mining methods have been suggested in past research papers, and several data clustering algorithms have been developed formining line patterns from event logs. In this paper, we introduce an open-source tool called LogClusterC which...
The requirement and expanding needs of bridging the physical and cyber world promote the emergence of a new global internet-based information architecture, the Internet of Things. The main challenge in Internet of Things is how to make fast and accurate decisions based on multi-modal sensing data. In this paper, we put human into the process and formulate a closed-loop computing paradigm for IoT data...
Web data acquisition is the foundation of Web data mining. Web crawler is an important tool for Web data acquisition, but the frequent updates of Web data structures, data sources and distribution channels, resulted in high costs of crawler program development and maintenance. In order to solve this problem, this paper designed and implemented an intelligent dynamic crawler, which stored the data...
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy entropy sources. Such sources when combined with fuzzy extractors allow cryptographically strong key derivation. Information theoretic fuzzy extractors...
In this letter, a secure waveform design for future 5G wireless system is proposed. The developed waveform referred to as secure orthogonal transform division multiplexing (OTDM) waveform, is designed to diagonalize the multi-path channel matrix of only the legitimate receiver (Bob), while degrading eavesdropper’s reception. In particular, instead of using fixed exponential basis functions, generated...
Due to the development of Smart Cities and Internet of Things, there has been an increasing interest in the use of Web information systems in different areas and domains. Besides, the number of attacks received by this kind of systems is increasing continuously. Therefore, there is a need to strengthen their protection and security. In this paper, we propose a method based on Process Mining and Model-Driven...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
Modern mobile platforms rely on a permission model to guard the system's resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components belonging to an app inherit those permissions, an app's components are typically over-privileged, i.e., components are granted more privileges than they need to complete their tasks. Systematic violation of least-privilege...
Episode Rule Mining is a popular framework for discovering sequential rules from event sequential data. However, traditional episode rule mining methods only tell that the consequent event is likely to happen within a given time intervals after the occurrence of the antecedent events. As a result, they cannot satisfy the requirement of many time sensitive applications, such as program security trading...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.