Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua...
详细信息
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evaluation to attributes and hidden information derived from ***,when the weight of attributes is researched,it is necessary to consider weight from subjective and objective ***,a novel weight allocation method is proposed by combining the fuzzy analytical hierarchy process(FAHP)method and the criteria importance though intercrieria correlation(CRITIC)***,based on the weight allocation method,the trustworthiness measurement models of component-based software are estab-lished according to the seven combination structures of ***,the model reasonability is verified via proving some metric ***,a case is carried *** to the comparison with other models,the result shows that the model has the advantage of utilizing hidden information fully and analyzing the com-bination of components *** is an important guide for measuring the trustworthiness measurement of component-based software.
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features(count of file lines and file size)for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76 s on the Kaggle malware dataset of Microsoft.
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i...
详细信息
Stock market forecasting is one of the most exciting areas of time series forecasting both for the industry and academia. Stock market is a complex, non-linear and non-stationary system with many governing factors and...
详细信息
This study explores the use of virtual reality (VR) as an educational tool to enhance the understanding of electricity and magnetism among 10th-grade students in India. A VR application was developed using Unity and M...
详细信息
Lung cancer exhibits one of the lowest survival rates among various cancer types over a five-year period, necessitating the utmost importance of early detection. Lung cancer can be detected in its early stage widely t...
详细信息
Social media users articulate their opinions on a broad spectrum of subjects and share their experiences through posts comprising multiple modes of expression, leading to a notable surge in such multimodal content on ...
详细信息
In human communication, expressing human emotion plays an essential role in transferring information to the other individual. The expression forms of human communication are very rich, in different patterns like facia...
详细信息
Recent advancements in satellite technologies have resulted in the emergence of Remote Sensing (RS) images. Hence, the primary imperative research domain is designing a precise retrieval model for retrieving the most ...
详细信息
In this paper, we introduce the Maximum Distance Sublattice Problem (MDSP). We observed that the problem of solving an instance of the Closest Vector Problem (CVP) in a lattice L is the same as solving an instance of ...
详细信息
暂无评论