Business districts are urban areas that have various functions for gathering people,such as work,consumption,leisure and *** to the dynamic nature of business activities,there exists significant tidal effect on the bo...
详细信息
Business districts are urban areas that have various functions for gathering people,such as work,consumption,leisure and *** to the dynamic nature of business activities,there exists significant tidal effect on the boundary and functionality of business ***,effectively analyzing the tidal patterns of business districts can benefit the economic and social development of a ***,with the implicit and complex nature of business district evolution,it is non-trivial for existing works to support the fine-grained and timely analysis on the tidal effect of business *** this end,we propose a data-driven and multi-dimensional framework for dynamic business district ***,we use the large-scale human trajectory data in urban areas to dynamically detect and forecast the boundary changes of business districts in different time ***,we detect and forecast the functional changes in business *** results on real-world trajectory data clearly demonstrate the effectiveness of our framework on detecting and predicting the boundary and functionality change of business ***,the analysis on practical business districts shows that our method can discover meaningful patterns and provide interesting insights into the dynamics of business *** example,the major functions of business districts will significantly change in different time periods in a day and the rate and magnitude of boundaries varies with the functional distribution of business districts.
Behavior based intrusion detection technologies are increasingly popular. Traditionally behavior patterns are expressed as specific signatures defined in the system call domain. This approach has various drawbacks and...
详细信息
ISBN:
(纸本)9781467300810
Behavior based intrusion detection technologies are increasingly popular. Traditionally behavior patterns are expressed as specific signatures defined in the system call domain. This approach has various drawbacks and is vulnerable to possible obfuscations. The IDS approach discussed herein addresses process behavior in terms of functionalities, i.e. particular process objectives. The functionalities are formalized in the form that is independent of their specific realizations and is obfuscation resistant. The malware is detected by particular sets of functionalities exposed by programs during their execution. The approach implies the selection of common malicious functionalities, followed by formal description of these functionalities via specific system call combinations. In the detection domain, monitored system calls are combined into API functions utilizing Colored Petri nets (CPN). After that API functions are combined into malicious functionalities, indicative of malware attack, also using CPN. The advantages of CPN utilization for dynamic code analysis are described. By its nature the described approach is signature-based. The CPN technology is the backbone of the described approach: CPNs are used to define the functionalities of interests as behavior signatures, and at the same time serve as the mechanism for the signature detection. The paper describes a unique general-purpose software tool implementing CPN. It constitutes the enabling technology for the described IDS approach, and has many additional applications for modeling and monitoring complex hierarchical systems of discrete events.
暂无评论