In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ...
详细信息
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly as possible. The paper first describes a worm behavior and propagation model. And then based on it, a new approach for early detection of Internet worms is proposed. This approach determines whether a worm incident has occurred by the change of the computers' connection degree. The approach is proved to be effective on early detection of unknown worms by experiments.
Aiming at the characteristic of text categorization, this paper proposes an improved method of computing term weights, tfidfie, based on the traditional tfidf function that is generally used in most classifiers. In co...
详细信息
Aiming at the characteristic of text categorization, this paper proposes an improved method of computing term weights, tfidfie, based on the traditional tfidf function that is generally used in most classifiers. In comparison with the tfidf function, the tfidfie function adds an information entropy factor, H, which represents the distribution of documents in the training set in which the term occurs. The experiments show tfidfie outperforms tfidf. In addition, this paper analyses the difference of using information entropy factor H between document categorization and feature selection, also finds that both two phases are all necessary for text categorization, meanwhile it can reach the best performance of classification with up to 70% of the unique terms being removed.
A Multimedia streams dynamic rate control algorithm based on Fuzzy adaptive PID (MFPID) has been proposed to implement multimedia streams' end sending rate on-line self-regulating and smoothing, and to track system...
详细信息
A Multimedia streams dynamic rate control algorithm based on Fuzzy adaptive PID (MFPID) has been proposed to implement multimedia streams' end sending rate on-line self-regulating and smoothing, and to track system resources in time, so that it can avoid system's regulating oscillation and guarantee system's stability. And, some work has been done to analyze adaptive session model of multimedia streams, to implement future available bandwidth estimation of IP network, to achieve PID parameters' on-line self-tuning by fuzzy controlling. Simulation validated the theoretical results of MFPID.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model uses mathematical method to express diverse entities in information and disaster recovery system such as applications, facilities, resources, sub disaster recovery plans, budget, etc. It classifies various resources according to their utilization and payment, and identifies the significance of applications and the conflicts among sub disaster recovery plans. Through expressing relationships among applications, facilities, resources and sub plans, this model selects the best set of sub plans. This model has less subjective parameter and can evaluate disaster recovery planning objectively and quantitatively.
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable command on disaster recovery. It uses selfsupervision function to monitor the integrality and security of system itself. Through GIS, this model makes disaster recovery system easier to use, manage and maintain. RDRSM possesses features of security, robustness and controllability and can be applied to environments such as e-government and bank. This model successfully conducted the construction of an important e-government disaster recovery system, which verified its feasibility and the significance of its components, such as disaster recovery planning, system supervision and robust communication support.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ...
详细信息
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two important parameters are discussed. The results of the improved algorithm used in the gene expression spectrum analysis show that, compared with Cheng and Church algorithm, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition while the computational time does not increase significantly.
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC...
详细信息
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.
Based on the existing security incident response working scheme, a novel incident response management model is proposed, based on the concept of alert life circle. An implementation structure of this new model is also...
详细信息
Based on the existing security incident response working scheme, a novel incident response management model is proposed, based on the concept of alert life circle. An implementation structure of this new model is also given. The system can manage and control the incident response process according to its current state in its life circle, and adjust the response actions as the environment changes. This model can provide an efficient response management and is beneficial to the implementation of automatic response as well.
Deployment of multicast service requires multicast security. Access control is one of the most important parts of multicast security. A way of access control based on session initiation protocol (SIP) is proposed. By ...
详细信息
Deployment of multicast service requires multicast security. Access control is one of the most important parts of multicast security. A way of access control based on session initiation protocol (SIP) is proposed. By the mechanism of authorization and S/MIME supported by SIP, multicast users, authenticating, authorizing and secure communicating are acquired. This method has the advantages of high-degree security stable operation and good performance of expansion, which can easily be transferred to run in IPV6.
暂无评论