The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of computers and the networks that connect them is increasingly becoming of great significance. As an effect, building effective intrusion detection models with good accuracy and real-time performance are essential. In this paper we propose a new data mining based technique for intrusion detection using Cost-sensitive classification and Support Vector Machines. We introduced an algorithm...
The following topics are dealt with: user behavior; intention aware computing; Internet LAN based RFID; intrusion detection system; document analysis; Web service; search engine; machine learning; neural network; collaborative communication; virtualized server; collaborative learning; video summary; computer simulation; fingerprint image matching; data analysis; Bayesian network; text visualization;...
The abuse of online-game bots has seriously hindered the development of online-game related business. However, in China there's no complete survey on game bots up to date yet. This paper we present an investigation of online game security issues, including bot behaviors and corresponding counter-measures. It shows that the increasing bots abusing damage the game business seriously and there are still...
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes...
Consciously or unconsciously, we are using many kinds of “cards” in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To protect the card holder from malicious use of his/her cards, it is necessary to authenticate the card user. For this purpose, a common practice is to ask the user to provide some key information (usually password) known...
An upper bound for the smallest period of the Fibonacci module sequence is obtained, which is 6N, and more accurate and convenient than the current results. Since the smallest period of the Fibonacci module sequence is twice of that of two-dimensional Arnold transformation, the upper bound for the smallest module period of Arnold transformation is naturally 3N. It is a great advance compared with...
How will information from online banks influence the choice of customers? This research uses information processing theory, WOM theory, perceived risk theory and trust theory, in order to find the flow of information from online banks to customers, and the relationships among those issues. Moreover, online banks in Mainland China are the targets of this research.
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
The following topics are dealt with: still and video cameras; analog and digital audio; 3D video; mobile broadband; mobile TV; handheld and wearable computers; personal multimedia devices; advanced DVD and CD; AV streaming to handheld devices; driver assistance; Web services; grid services and service-oriented computing; semantic Web and ontology; Web intelligence; agents and personalization; mobile...
Against the low efficiency of training on large-scale SVM, a reduction approach is proposed. This paper presents a new samples reduction method, called bistratal reduction method (BRM). BRM has two levels. The first level is coarse-grained reduction. It deletes the redundant clusters with KDC reduction. The second level is fine-grained reduction. It picks out the support vectors from the clusters...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
Comparing with traditional Web techniques, Web Service is a loose coupling to efficiently integrate the information cross-enterprise, cross-platform, and cross-language. It's also standards-based and platform neutral .These features make the Web Service technology ideal for system integration at the enterprise level, and for supporting Business-to-business integration and application-to-application...
Over the past many years, mobile bank has played an import role in our daily life. This paper describes the infrastructure of the mobile bank, then find out the security threats that exist, and give the security and risk management strategy of Mobile Banking System.
During the first decade of this century, the online games are developed rapidly in China. But the virtual items transaction problems hinder the development of online games. Traditional trading models cannot meet the demand of both security and convenience at the same time. In order to improve the traditional transaction models, this paper presents a more secure transaction platform by embedding a...
The goal of library information resources construction under network environment is to achieve the sharing and building of information resources. The security mechanism construction of information resources sharing and building is the only way for library develops and utilizes the information resources under network environment. Through a series of ways such as establishing the legal security system...
Single biometric identification becomes the bottleneck problem of biometric identification technology inevitably because of its limitation and objectivity. In order to solve the problem, double biometric identification technology will become the main direction of future development. This article is based on this idea and adopts handprints recognition which combines fingerprints recognition with palmprints...
A reputation service is an essential part of a reputation system, which collects, distributes, and aggregates feedback about service providers' past behaviour. The feedback, as a score, is given interactively or by a user or is derived from a monitoring process automatically. The reputation service accommodates for each service provider an accumulated score as its reputation, which is produced by...
In this paper, an intrusion detection model is proposed based on multilayer perceptrons neural network . In this model, HISTORY is used to collect data. Then, the data stream is converted its' data structure for preprocessing. We use pattern matching module to filter out some of the known intrusions, in oder to reduce the load of the next step on intrusion detection, and the efficiency and accuracy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.