The development of Cyber-Physical Fusion Technology gradually takes the power grid in the direction of intelligence, making the smart substation a typical cyber-physical fusion system. However, while the introduction ...
详细信息
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln...
详细信息
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel...
详细信息
With the development of the research in data mining, cluster analysis has been widely used in several areas. Aiming at the issue that traditional clustering methods are not appropriate to high-dimensional data, a cuck...
详细信息
ISBN:
(纸本)9781785610899
With the development of the research in data mining, cluster analysis has been widely used in several areas. Aiming at the issue that traditional clustering methods are not appropriate to high-dimensional data, a cuckoo search fuzzy-weighting algorithm for subspace clustering is proposed on the basis of the existing soft subspace clustering algorithms. In the proposed algorithm, a novel objective function is firstly designed by considering the fuzzy weighting within-cluster compactness and the between-cluster separation, and loosening the constraints of dimension weight matrix. Then gradual membership and improved cuckoo search, a global search strategy, are introduced to optimize the objective function and search subspace clusters, giving novel learning rules for clustering. At last, the performance of the proposed algorithm on the clustering analysis of various low and high dimensional datasets is experimentally compared with that of several competitive subspace clustering algorithms. Experimental studies demonstrate that the proposed algorithm can obtain better performance than most of the existing soft subspace clustering algorithms.
Feature selection is an important means to solve the problem of dimension reduction in anomaly network traffic detection. Focusing on the problem of traditional feature selection algorithm based on information gain ne...
详细信息
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the leas...
详细信息
ISBN:
(纸本)9781785610899
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the least cost of the services, the fitness function which can comprehensive response the time and cost was designed, and an estimation of distribution-shuffled frog leaping algorithm (EDSFLA) was proposed. This algorithm redefined the evolutional operators of shuffled frog leaping algorithm (SFLA), utilizing the cross operators of genetic algorithm, targeted in applying to scheduling problem with integer-coded. EDSFLA introduced evolutionary strategy of estimation of distribution to break the confine of search pattern in the standard SFLA, and made the learning ability of this algorithm more comprehensive. Experimental results show that this algorithm has more capability in convergence and searching ability compared with the standard SFLA and EDA in solving cloud resource scheduling problems.
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini...
详细信息
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense gam...
详细信息
ISBN:
(纸本)9781785610899
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense game model based on signaling game, which was modeled in a dynamic and incomplete way. We improved the attack-defense strategies quantitative method of the completed static game model to meet the needs of the network signaling game model. Moreover, we put forward an active defense strategy selecting algorithm to select optimal defense strategy for different characters of defender. At last, we analyzed and proved the feasibility and validity of the model and method through a network example.
Nowadays, the network defense based on incomplete information game model ignored the type of the defender, used simple cost quantitative method, and chosen defense strategies improperly. Aiming at the problem, this pa...
详细信息
ISBN:
(纸本)9781785610899
Nowadays, the network defense based on incomplete information game model ignored the type of the defender, used simple cost quantitative method, and chosen defense strategies improperly. Aiming at the problem, this paper proposed an active defense strategy selection based on static Bayesian game theory, constructed static Bayesian game model. The model considered the types of the attacker and the defender, and improved the classical strategies taxonomy and cost quantitative method with considering the strike back act of the defender and the success attack rate. Then, this paper calculated and comprehensively analyzed the Bayesian equilibrium of the game. Taking mixed strategies Bayesian equilibrium of attacker as the defender's prediction of attacker's action, this paper calculated the defense effectiveness of defense strategies and performed a defense strategies selection algorithm. At last, an example was provided to analyze and demonstrate the effectiveness of the model and algorithm.
In order to satisfy the requirement of service presenters’ credibility for recommendation system, this paper puts forward a method based on the analysis of the presenters’ reputation record to find the credible pres...
详细信息
暂无评论