The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network attack graphs are a type of analysis tool that can be used to determine the impact that security vulnerabilities have on the network. It is important, then, for attack graphs to be able to represent enough information to aid this analysis. Moreover, they must be able to handle and integrate new vulnerabilities that are being discovered by the security community. We developed a prototype tool...
With the rapid development of information technology, campus card has become an important part of the construction of digital campus. Based on the campus card to build a user behavior analysis system, which can help the school to master the student school of learning, consumption and rest behavior. This article discusses the specific behavior of campus card consumption and the data mining and analysis...
Human mobility modelling has emerged as an important research area over the past years. The opportunities that mobility modelling offers are widespread. From smart transportation services to reliable recommendations systems, all require generation of mobility models. Since mobility of humans is generally motivated by the activities they perform, activity recognition emerges as a vital initial step...
Many of today's machine learning (ML) systems are composed by an array of primitive learning modules (PLMs). The heavy use of PLMs significantly simplifies and expedites the system development cycles. However, as most PLMs are contributed and maintained by third parties, their lack of standardization or regulation entails profound security implications. In this paper, for the first time, we demonstrate...
In this paper, we present the TARZAN platform, an integrated platform for analysis of digital data from security incidents. The platform serves primarily as a middleware between data sources and data processing applications, however, it also provides several supporting services and a runtime environment for the applications. The supporting services, such as a data storage, a resource and application...
For strengthening the effective supervision of key vehicles' illegal driving which are not in accordance with the prescribed routes, and to prevent and reduce the road accidents, this paper puts forward a method of the active discrimination of key vehicle's not-according-to-the-prescribed-routes based on the gate system's passing through information. Through analyzing key vehicles' passing records...
The cost and effort of developing software systems in a new technical area can be extensive. An organization must perform a domain analysis to discover competing products, analyze their architectures and features, and ultimately discover and specify product requirements. However, delivering high quality products, depends not only on gaining an understanding of functional requirements, but also of...
Steganography is the science of hiding information to send secret messages using the carrier object known as stego object. Steganographic technology is based on three principles including security, robustness and capacity. In this paper, we present a digital image hidden by using the compressive sensing technology to increase security of stego image based on human visual system features. The results...
Determining threshold values of key economic security indices describing an economic situation in any country is an important stage in the assessment of the country's economic stability. Threshold values must be periodically reevaluated due to their continuous deterioration as far as the global economic environment is undergoing changes. The authors offer a rough estimate method for achieving this...
In this study, we present a method for extracting and representing knowledge of presentation slide creators based on the slide contents that are published on a slide sharing service. The proposed method regards the number of views, downloads, and likes from other users as the users rating for a presentation slide, and extract knowledge of the slide creator in terms of the usefulness and knowledge...
Recruitment and selection of new employees rank to the important processes of human potential management and development. Especially the process of employee selection prepares proper conditions for a successful work performance and decides on a future progress-ability of the organizations. In a unique sector of private security, the precise realization of employee selection can solve one of the most...
Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related...
This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack...
Support Vector Machines (SVM) is a widely used technique for classifying high-dimensional data, especially in security and intelligence categorization. However, the performance of SVM can be adversely affected by poorly selected parameter values. Current approaches to SVM parameter selection mainly rely on extensive cross validation or anecdotal information, which can be inefficient and ineffective...
This manuscript intends to explore the application of a specific secure data environment within different prototypes of information sharing. It focuses on data management with confidence and agility for the exchange of information. Through discussion and examples, the paper explores the landscape surrounding sensitive data sets. In particular, the paper looks at the application of data sharing related...
Compared with other areas, knowledge management in education area has been lack of attention for a long time. This paper did a survey on undergraduate in a Chinese research university. By designing the questionnaire, implementing the survey website by programming, we got 515 original data from art students and science students. Then we analyzed the data by several data-mining algorithms, e.g. the...
The pervasive imbalanced class distribution occurring in real-world stream applications, such as surveillance, security and finance, in which data arrive continuously has sparked extensive interest in the study of imbalanced stream classification. In such applications, the evolution of unstable class concepts is always accompanied and complicated by the skewed class distribution. However, most of...
When individual-level health data is shared in biomedical research the privacy of patients and probands must be protected. This is typically achieved with methods of data de-identification, which transform data in such a way that formal guarantees about the degree of protection from re-identification can be provided. In the process it is important to minimize loss of information to ensure that the...
This paper makes an empirical test on the correlation between financial restatement and audit report lag (ARL) using data of non-financial listed companies in China during the period 2009–2012. The empirical results show that there is a significant positive correlation between financial restatement and ARL. The longer the ARL is, the more likely it is for the company to perform a financial restatement...
We consider the {n, k, d, l) secure exact-repair regenerating code problem, which generalizes the {n, k, d) exact-repair regenerating code problem with the additional constraint that the stored file needs to be kept information-theoretically secure against an eavesdropper, who can access the data transmitted to regenerate a total of l different failed nodes. For all known results on this problem,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.