Virtual machine (VM) technology was recently adopted in an undergraduate lab on Intrusion Detection Technologies. Each student was provided with a pre-built, but non-configured Fedora Core 5 Linux VM image that was us...
详细信息
Virtual machine (VM) technology was recently adopted in an undergraduate lab on Intrusion Detection Technologies. Each student was provided with a pre-built, but non-configured Fedora Core 5 Linux VM image that was used to complete hands-on labs using the virtual machine on her/his own computer. To prepare the lab environment, a virtual network was built with Windows, Linux, FreeBSD, and Solaris virtual machines to simulate network attacks. Network traces of attacks were generated inside the virtual network using Metasploit Framework and other penetration testing tools. Student exercises included installing and using host-based intrusion detection systems, network-based intrusion detection systems and network monitoring tools. Students used TCPdump, Ethereal, Snort, and Bro to analyze the trace files. Students also performed installation and detection of loadable-kernel-module rootkits inside the virtual machine. A "compromised" virtual machine could be deleted after the lab and a fresh virtual machine could be reopened from the pre-built image in no time. The virtual machine was easy to use and easier to maintain than a real computer. Using VM technology, it was possible to build a very "real" network environment at a minimal cost. Hands-on exercises of concepts could be set up in the virtual machine. Students were offered various opportunities to test other platforms such as Solaris without acquiring real physical machines. Additionally, the lab was available to students around the clock. The adoption of VM technology helped students understand basic concepts, increased their interests and improved their troubleshooting skills. In addition, VM technologies expanded the physical boundaries of the lab environment. Students were able to use their own personal computers at home to perform lab exercises that previously would have required multiple machines configured in a dedicated lab room. This flexibility allowed the students to work at their own pace, and extended
In this paper, we first provide a new theoretical understanding of the Evidence Pre-propagated Importance Sampling algorithm (EPIS-BN) (Yuan & Druzdzel 2003;2006b) and show that its importance function minimizes t...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distrib...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distributions. However, inference in such general hybrid models is hard. Therefore, existing approaches either only deal with special instances, such as Conditional Linear Gaussians (CLGs), or approximate a general model with a restricted version and then perform inference on the simpler model. However, results thus obtained highly depend on the quality of the approximations. This paper describes an importance sampling-based algorithm that directly deals with hybrid Bayesian networks constructed in the most general settings and guarantees to converge to the correct answers given enough time.
Knowledge elicitation is difficult for expert systems that are based on probability theory. The elicitation of probabilities for a probabilistic model requires a lot of time and interaction between the knowledge engin...
详细信息
In order to assist driver's vision, a real-time recognition system for traffic signs is proposed. After detecting sign candidates, biologically inspired opponent-color filters are used to extract symbol parts of s...
详细信息
ISBN:
(纸本)9781617387777
In order to assist driver's vision, a real-time recognition system for traffic signs is proposed. After detecting sign candidates, biologically inspired opponent-color filters are used to extract symbol parts of signs. After normalizing the size of symbol, structural features are calculated to identify the sign. 5572 segmented images are used to design the algorithm. In a real-time system, the same sign in a sequence of frames is tracked, and a majority vote is used to integrate the recognition results. For test data, 93.8% recall rate and 99.3% precision rate could be attained. In-vehicle experiment also showed high recall and precision rates.
Including concepts of entrepreneurship in an engineering education is nothing new. It would be difficult to find a university that does not offer several courses or specific programs in entrepreneurship. However, find...
详细信息
Since October 2005, the business and engineering faculties of the Milwaukee School of Engineering (MSOE) have been working on a novel effort to integrate entrepreneurship into the engineering curricula. Our methods br...
详细信息
Finding relevant information in a hyperspace has been a much studied problem for many years. With the emergence of so called Web 2.0 technologies we have seen the use of social systems for retrieval tasks increasing d...
详细信息
ISBN:
(纸本)1595938206
Finding relevant information in a hyperspace has been a much studied problem for many years. With the emergence of so called Web 2.0 technologies we have seen the use of social systems for retrieval tasks increasing dramatically. Each system collects and exploits its own pool of community wisdom for the benefit of its users. In this paper we suggest a form of retrieval which exploits the pools of wisdom of multiple social technologies, specifically social search and social navigation. The paper details the added user benefits of merging several sources of social wisdom. We present details of the ASSIST engine developed to integrate social support mechanisms for the users of information repositories. The goal of this paper is to present the main features of the integrated community-based personalization engine that we have developed in order to improve retrieval in the hyperspace of information resources. It also reports the results of an empirical study of this technology. Copyright 2007 ACM.
Multimedia tutorials available online are becoming popular as a means of providing canned explanations for difficult material for brick and mortar classes and online courses. The availability of free multimedia produc...
详细信息
Infinite games with incomplete information are common in practice. First-price, sealed-bid auctions are a prototypical example. To solve this kind of infinite game, a heuristic approach is to discretise the strategy s...
详细信息
暂无评论