In the current situation of world economic and political uncertainty, risk assessment and management of a company is inevitably required as an obligation not just an option. Information security assessment is an impor...
详细信息
ISBN:
(纸本)9780889868618
In the current situation of world economic and political uncertainty, risk assessment and management of a company is inevitably required as an obligation not just an option. Information security assessment is an important component of an effective risk management process. This paper proposes a technique how business should determine its information assets and justify the investments in information system protection by using the well-known technique called the cost-benefit analysis (CBA). In order to examine the technique, one of the lubricating oils companies is selected as a case study. Its system is then assessed and the information assets are determined. The security weaknesses or vulnerability of the systems have been defined. Finally, some potential solutions were recommended to be implemented. An incident response management including its associated plans is also introduced as an application of information security assessment. The result from this research indicated that the CBA technique can be used as an effective tool to optimize the IT security investment and prioritize the implementation.
In the broadband signal processing, in order to receiving broadband signals without distortion resulting from the different relative aperture, it is valuable to study the Frequency-invariant beam patterns (FIBPs). Bas...
详细信息
For solving the issue of key distribution in the clustered sensor networks, proposed a key distribution scheme based on layers, in which base station sends the secret knowledge of member nodes to the cluster-header, a...
详细信息
An intrusion is defined as any set of actions that compromise the integrity, confidentiality or availability of a resource. Data mining is to identify valid, novel, potentially useful, and ultimately understandable pa...
详细信息
Edge detection of bottle opening is a primary section to the machine vision based bottle opening detection system. This paper, taking advantage of the Balloon Snake, on the PET (Polyethylene Terephthalate) images samp...
详细信息
We discuss a methodology for extracting socio-cultural information from transcripts of natural language conversations. The methodology is applicable to a wide variety of languages. We use Russian and Tamil for illustr...
详细信息
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical...
ISBN:
(纸本)9780769539829
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical infrastructures protection;intelligent decision making based on data mining using differential evolution algorithms and framework for ETL workflow management;robotic arm actuation with 7 DOF using Haar classifier gesture recognition;statistical analysis of communication networks with multidomain design and automation tools;analysis of call set-up delay for different resource control schemes in next generation networks;speech enhancement using perceptual-decision-directed approach;a novel transient system survivability quantitative evaluation framework;PID controller design for semi-active car suspension based on model from intelligent system identification;and the kinematics model of a two-wheeled self-balancing autonomous mobile robot and its simulation.
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical...
ISBN:
(纸本)9780769539829
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical infrastructures protection;intelligent decision making based on data mining using differential evolution algorithms and framework for ETL workflow management;robotic arm actuation with 7 DOF using Haar classifier gesture recognition;statistical analysis of communication networks with multidomain design and automation tools;analysis of call set-up delay for different resource control schemes in next generation networks;speech enhancement using perceptual-decision-directed approach;a novel transient system survivability quantitative evaluation framework;PID controller design for semi-active car suspension based on model from intelligent system identification;and the kinematics model of a two-wheeled self-balancing autonomous mobile robot and its simulation.
Because it is hard to calculate the TOPMD statistical properties by analytic method, in this paper the modulator method is adopted. So based on polarization-maintaining fiber model, the vector's property and its c...
详细信息
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid an engineer in addressing the presence...
详细信息
ISBN:
(纸本)9781450304948
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid an engineer in addressing the presence of large clusters. Such a visualization is presented. It allows a program's dependence clusters to be considered from an abstract high level down thru a concrete source-level. At the highest level of abstraction, the visualization uses a heat-map (a color scheme) to efficiently overview the clusters found in an entire system. Other levels include three source code views that allow a user to "zoom" in on the clusters starting from the high-level system view, down through a file view, and then onto the actual source code where each cluster can be studied in detail. Also presented are two case studies, the first is the open-source calculator bc and the second is the industrial program copia, which performs signal processing. The studies consider qualitative evaluations of the visualization. From the results, it is seen that the visualization reveals high-level structure of programs and interactions between its components. The results also show that the visualization highlights potential candidates (functions/files) for re-factoring in bc and finds dependence pollution in copia.
暂无评论