ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual mode...
详细信息
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base...
详细信息
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method based on discrete-time Markov chains (DTMC) with states of variable-length sequences. The method firstly generates multiple shell command streams of different lengths and combines them into the library of general sequences. Then the states are defined according to variable-length behavioral patterns of a valid user, which improves the precision and adaptability of user profiling. Subsequently the transition probability matrix is created. In order to reduce computational complexity, the classification values are determined only by the transition probabilities, then smoothed with sliding windows, and finally used to discriminate between normal and abnormal behavior. Two empirical evaluations on datasets from Purdue University and AT&T Shannon Lab show that the proposed method can achieve higher detection accuracy and require less memory than the other traditional methods.
Introduce the basic concept of best rational approximation and constructing procedure of the best rational approximation function in Laplace domain. By an illustrative example the design method of FOC based on best ra...
详细信息
Introduce the basic concept of best rational approximation and constructing procedure of the best rational approximation function in Laplace domain. By an illustrative example the design method of FOC based on best rational approximation is discussed. The performance comparison of transfer functions between the FOC obtained by best rational approximation method and conventional PID shows that it is effective to apply the method in design of FOC, which can guarantee maximum absolute error of amplitude frequency characteristic of approximation function in a given error tolerance.
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained *** reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable *** the security level is improved,and it is suitable for higher security environment.
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless...
详细信息
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling on the quantum channel. Although this scheme uses entangled states for encoding, only single-particle product measurements are required.
Threshold signature plays an important role to distribute the power of a single authority in modem electronic society. In order to add functions and improve efficiency of threshold signatures, a multi-policy threshold...
详细信息
Threshold signature plays an important role to distribute the power of a single authority in modem electronic society. In order to add functions and improve efficiency of threshold signatures, a multi-policy threshold signature scheme with distinguished signing authorities is proposed. In the scheme two groups can sign and verify each other, so the scheme is two-way signing and verifying. Moreover, the threshold values of the two groups can change with the security classification of the signing document, every discretionary signatory only signs a small part of the document instead of the whole one, so the bandwidth of data transmission for group signature construction can be reduced and the size of group signature is equivalent to that of any individual signature.
Composite insulators have been widely used in high voltage transmission lines more than 20 years in China due to their hydrophobic properties, relatively low weight and maintenance costs, and high mechanical strength....
详细信息
Composite insulators have been widely used in high voltage transmission lines more than 20 years in China due to their hydrophobic properties, relatively low weight and maintenance costs, and high mechanical strength. Shed configuration is a key factor that influences flashover voltage of composite insulators under icing conditions. In order to study the effect of shed configuration on the flashover performance of composite insulators under icing conditions, the electrical performance of five types of 330-kV composite insulators with different shed designs were compared under artificial icing conditions. Experiments were carried out in the multi-function climate chamber in Chongqing University. In order to explain the influence of shed configuration, electric field and potential distributions along each insulator type were calculated numerically using the finite element method (FEM). The numerical simulation results were found to be in agreement with the laboratory experimental ones.
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlat...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal *** the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the *** receiver then performs projective determinate measurement to decode the secret message ***,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.
暂无评论