The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Pr...
详细信息
The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs) and Intrusion Response Systems (IRSs). Using characteristics of response and attack time frame, a response model is proposed to distinguish between active and passive response options. The characteristics of response include level of operations, speed and time of response, ability to learn and ability to cooperate with other devices. This paper uses the attack time frame as a response model to show the relationship between active and passive response. Furthermore, the Response Model for Intrusion Response Systems shows some other different approaches and stages of active response. Finally, in order to investigate the most common response used by security practitioner and to justify the response model, studies involving 34 samples products from both commercial and non-commercial are analysed. As a result, this paper shows a clear distinction between the options of responses.
Requirements Engineering is a sub discipline of Software Engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not ...
详细信息
ISBN:
(纸本)9781424469826;9788988678183
Requirements Engineering is a sub discipline of Software Engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not fulfill the needs of its users. A number of contributions have been made to refine the requirements engineering process. Most of them attempted to link requirements to goals. This new trend is called as Goal-Oriented Requirement Engineering (GORE). A number of goal-oriented RE methods have been subsequently derived by various researches. This paper reviews some of the significant research works done in GORE. The comparative study may serve as a guide for readers to select an appropriate goal-oriented technique for fulfilling his/her requirements engineering needs.
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to...
详细信息
The human immune system provides inspiration in the attempt of solving the knowledge acquisition bottleneck in developing ontology for semantic web application. In this paper, we proposed an extension to the Guided Ag...
详细信息
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration...
详细信息
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to...
详细信息
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to cover, if possible, all the trip demands. The problem formulation has been done using sequential approach where an integer programming and goal programming models have been presented respectively for vehicle scheduling problem and driver scheduling problem.
An operational model was developed for forecasting ionospheric variations and storms at Kokubunji (35° N, 139° E), 24 hours in advance, by using a neural network. The ionospheric critical frequency (foF2) sh...
详细信息
An operational model was developed for forecasting ionospheric variations and storms at Kokubunji (35° N, 139° E), 24 hours in advance, by using a neural network. The ionospheric critical frequency (foF2) shows periodic variabilities from days to the solar cycle length and also shows sporadic changes known as ionospheric storms caused by geomagnetic storms (of solar disturbance origin). The neural network was trained for the target parameter of foF2 at each local time and input parameters of solar flux, sunspot number, day of the year, K-index at Kakio-ka. The training was conducted using the data obtained for the period from 1960 to 1984. The method was validated for the period from 1985 to 2003. The trained network can be used for daily forecasting ionospheric variations including storms using prompt daily reports of K-index, sunspot number, and solar flux values available on-line.
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration...
详细信息
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration, reduction and transformation. The literature shows that each preprocessing step consists of various techniques. In order to develop quality data, a data miner must decide the most appropriate techniques in every step of data preprocessing. In this study, we focus on data reduction particularly data discretization as one important data preprocessing step. data reduction involves reducing the data distribution by reducing the range of continuous data into a range of values or categories. data discretization plays a major role in reducing the attribute intervals of data values. Finding an appropriate number of discrete values will improve the performance of the data mining modelling, particularly in terms of classification accuracy. This paper proposes four levels of data discretization taxonomy as follows: hierarchical and non-hierarchical; splitting, merging and combination; supervised and unsupervised combinations; and binning, statistic, entropy and other related techniques. The taxonomy is developed based on a detailed review of previous discretization techniques. More than fifty techniques are investigated, and the structure of the discretization approach is outlined. Guidelines on how to use the proposed taxonomy are also discussed.
TETRA (Terrestrial Trunked Radio) is the standard of DTRS (Digital Trunked Radio System) developed by the ETSI (European Telecommunications Standards Institute). Currently, TETRA has been selected as the power IT wire...
详细信息
TETRA (Terrestrial Trunked Radio) is the standard of DTRS (Digital Trunked Radio System) developed by the ETSI (European Telecommunications Standards Institute). Currently, TETRA has been selected as the power IT wireless backbone network in Korea while the traditional distribution automation system has used the wireless network of mobile service provider using CDMA (Code Division Multiple Access) and WCDMA (Wideband CDMA) modems. Therefore, the development of gateway platform is indispensable according to the change to the TETRA network. In this paper, we propose an embedded Linux-based gateway platform for transmitting industrial power IT protocol using TETRA network.
The paper presents an implementation of the current state-of-the-art, with respect to acquisition, analysis and distribution of real-time remotely sensed data from multiple polar orbiting and geostationary earth obser...
详细信息
暂无评论