With the development of WLAN (wireless local area network), the security problems become more apparent than before. 802.11i protocol enhances the security performance such as encryption and authentication, however, th...
详细信息
Reducing the risk of IT governance often get a lot of attention. Journal and newspaper articles abound, and professional books have been written on the subject. this article presents a Conditional Random Fields (CRF) ...
详细信息
ISBN:
(纸本)9781424455379
Reducing the risk of IT governance often get a lot of attention. Journal and newspaper articles abound, and professional books have been written on the subject. this article presents a Conditional Random Fields (CRF) based risk assessment model. We first analyzed and evaluated the existing information security risk assessment methodology, and described control processes of information systems and risk levels summarily. After that, CRF model was introduced into information system security assessment, which can improve model-based information security risk assessment method (CORAS). this article taking web-based electronic banking system for an example, we quantify the risk indicators of a given task sequence, by formal description and modeling of system flow and risk levels. The experiments demonstrate the feasibility of CRF model, which laid the foundation for information system risk assessment and IT governance security.
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the exis...
详细信息
ISBN:
(纸本)9781424455379
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace can be restored and the more comprehensive attack scenario description information will be generated using this technology. This working lets the security manager more comfy. The state machine based attack scenario reconstruction technology processes security events using clustering analysis and causal analysis concurrently, it builds a correlation state machine in memory for every attack scenario tree which is predefined by the security manager, when security events are coming, the current state set of the correlation state machine will process them, if the condition is satisfied, the current states of the state machine will transfer, it corresponds to the developing of the multi-step attack. If one of the leaf nodes of the state machine is in its current state set, an attack scenario description information will be generated and then sent to the security manager. The correlating technology based on state machine is more timely and accurately, and at last, we use the DARP A2000 Intrusion Scenario Specific Data Sets to validate the technology, the experiment results show that it is feasible to analyze security events using the technology we proposed.
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of informationtechnology, it become easy to atta...
详细信息
ISBN:
(纸本)9781424455379
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of informationtechnology, it become easy to attack systems, and detection of hiding methods became necessary to fmd ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses;secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) after end of header file within execution file (EXE file) to make sure changes made to the:file will not be detected by universe and the functionality of the exe file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file
Multiple targets tracking is one of the challenging applications in a wireless sensor network due to targets39; movement in different directions, targets39; speed variations and frequent connectivity failures of l...
详细信息
Enhanced vision especially in poor weather conditions can be achieved by image fusion between the infrared and visible images. Image registration is a crucial step in image fusion. In order to register the infrared an...
详细信息
ISBN:
(纸本)9781424455379
Enhanced vision especially in poor weather conditions can be achieved by image fusion between the infrared and visible images. Image registration is a crucial step in image fusion. In order to register the infrared and visible images captured in poor weather conditions, the registration method combing the Bidimensional Empirical Model Decomposition (BEMD) with mutual information is proposed in this paper. After the infrared and visible images are decomposed into a set of Intrinsic Mode Functions (IMFs) and residue respectively by BEMD, the parameters of affine transform can be obtained through using the maximum mutual information registration between IMFs images. Then, the transform matrix defined by these parameters is used to the source infrared image and the final registered image can be obtained through interpolation and resampling for the transformed image. This method is used to register two video sequences captured in dense fog. Experimental results show that this method gives better performance compared to other two methods.
Decision-making structures are important building blocks in most of the software;however, it may be difficult to verify them because there are various input conditions and several paths causing them to behave differen...
详细信息
This paper presents an improved LSD matching steganography, which complementarily modifies the pairs of pixels with adjacent intensity to embed secrete message. In LSD matching steganography, when adding or subtractin...
详细信息
This paper proposes the design and implementation of a microcontroller- based single-phase automatic voltage regulator (AVR). The basic building blocks for this design include a PIC 16f 628 microcontroller, a triac, a...
详细信息
暂无评论