Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected ...
详细信息
ISBN:
(纸本)0769515495;0769515509
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI model. At the physical layer, they can be protected by lock-and-key, and at the data link, they can be protected within VLANS (Virtual LANs). Withthe network and transport layers, networks can be secured by firewalls, which monitor source and destination network addresses, and source and destination ports, respectively. At the session level, user names and passwords are be used. Unfortunately, all these methods can be prone to methods, which can overcome the protection used. this paper expands the research previously undertaken on a misuse system based on intelligent agent software technology. the system monitors user actions in real-time and take appropriate actions if necessary. Along withthis our system used short-term prediction to predict the user behaviour and advise the system administrator accordingly, before the actual actions take place. this paper presents new results, which are based on an increased number of users. We have made more extensive experiments than our first series of experiments, on the user behaviour. We also have tested our short-term prediction model, introduced the notion of intervention to our model, and found that the results are very close to the actual user behaviour.
the paper describes an algorithm for parameter optimisation of evolving connectionist systems (ECOS) in an offline processing mode. the algorithm is illustrated on a case study of a classification system that uses gen...
详细信息
the paper describes an algorithm for parameter optimisation of evolving connectionist systems (ECOS) in an offline processing mode. the algorithm is illustrated on a case study of a classification system that uses gene expression data to predict an outcome of a treatment of cancer disease.
In this paper, we present the application of neural network for predicting software development faults including object-oriented faults. Object-oriented metrics can be used in quality estimation. In practice, quality ...
详细信息
ISBN:
(纸本)9810475241
In this paper, we present the application of neural network for predicting software development faults including object-oriented faults. Object-oriented metrics can be used in quality estimation. In practice, quality estimation means either estimating reliability or maintainability. In the context of object-oriented metrics work, reliability is typically measured as the number of defects. Object-oriented design metrics are used as the independent variables and the number of faults is used as dependent variable in our study. software metrics used include those concerning inheritance measures, complexity measures, coupling measures and object memory allocation measures. We also test the goodness of fit of neural network model by comparing the prediction result for software faults with multiple regression model. Our study is conducted on three industrial real-time systems that contain a number of natural faults that has been reported for three years (Mei-Huei Tang et al., 1999).
this book constitutes the refereed proceedings of the 9thinternational IFIP WG 2.13 conference on Open Source Systems, OSS 2013, held in Koper-Capodistria, Slovenia, in June 2013. the 18 revised full papers and 3 sho...
详细信息
ISBN:
(数字)9783642389283
ISBN:
(纸本)9783642389276;9783642427435
this book constitutes the refereed proceedings of the 9thinternational IFIP WG 2.13 conference on Open Source Systems, OSS 2013, held in Koper-Capodistria, Slovenia, in June 2013. the 18 revised full papers and 3 short papers presented were carefully reviewed and selected. the papers are organized in topical sections on innovation and sustainability; practices and methods; FOSS technologies; security and open standards; and business models and licensing.
暂无评论