Policy is an essential part of computer network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing...
详细信息
ISBN:
(纸本)9781467348065
Policy is an essential part of computer network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing in defense policies is becoming more and more crucial for ensuring the security of policies themselves. In this paper, we use a computer network defense policy specification language called CNDPSL, according to a model called CNDPM, to describe computer network defense policies, which can provide a uniform method of specifying policies of protection, detection and response. First, this article analyses conflicts existing in defense policies and shows the classification of these conflicts. Then, it gives a computer network defense policy detection model. Finally, this article shows a prototype system of computer network defense policy conflict detection, and validates the effectiveness of the prototype system with experiments.
computer Network Defense Policy is the rules of computer network and security devices. In order to achieve specific security objectives, the network need to choose the defensive measures under certain conditions. In o...
详细信息
ISBN:
(纸本)9781467348065
computer Network Defense Policy is the rules of computer network and security devices. In order to achieve specific security objectives, the network need to choose the defensive measures under certain conditions. In order to generate the measures implemented by the device, it usually requires manual or automated translation from high-level network defense policy. In the translation process, due to the presence of semantic loss, man-made understanding mistakes, device machinery, etc., the high-level policy requirements cannot be completely satisfied. This will result in hiding network security risks or vulnerabilities. Through analysis of the consistency between high-level policy and low-level measures, and pointing out the lack and redundancy between the policy and measures, it can guide the further translation of policy on the device. This paper presents a novel formal and automated method to verify the consistency. When errors are detected, we will point out the location of the misconfiguration. The same time, based on SMT solving tools, it has been implemented in a prototype of consistency verifier. Experiments demonstrate that this tool is able to check the consistency and have good scalability and efficiency.
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (N...
详细信息
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (NSE) proposed recently by us quantifies synchronization between neuronal signals at multiple *** paper meant to explore the behavior of synchronization of multichannel EEG in AD and healthy normal controls at rest, and preliminarily make clear the clinical significance of the NSE in AD *** (EEG) were recorded from 10 AD patients and 12 age-matched healthy normal controls (NC). NSE values were computed both across the all frequency band and separately in the delta, theta, alpha, beta (including beta1, beta2 and beta3), and gamma bands. The Mini-Mental Status Examination (MMSE) was used to assess the symptom severity of AD patients and *** values in the beta1 and beta2 bands were significantly lower in AD patients than in NC. NSE values in the alpha and beta1 bands were positively correlated with the MMSE scores in all participants (AD and NC). In AD patients, NSE values in the alpha, beta1 and beta2 bands were also positively correlated with MMSE *** results suggest that NSE values are a useful correlate of EEG synchronization in AD patients.
Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi...
详细信息
Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of this study was to examine the role of DHPG in the generation of oscillatory field activity at theta frequency in the medical septal diagonal band of Broca (MSDB) slice prepared from rat brain, and to determine the phase relationship between spikes and theta oscillations. The DHPG induced large amplitude field population spiking activity, which is correlated linearly with the field theta oscillations. The relationship between timing of spikes and the phase of theta oscillation was determined by an analysis of circular statistics. Further analysis with Rayleigh test revealed that the relationship of phase-locking between spikes and theta rhythm is of statistical significance. These data demonstrate that DHPG-sensitive neuronal networks within medial septum are able to generate theta oscillations which are modulated by large amplitude population spikes and phase-locking of spikes to the theta rhythm suggest the role of memory enhancement in the presence of mGluR1 activation.
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to com...
详细信息
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to compress the dataset to save the memory space. In DAG, each node is related to a rowid, and each two nodes have a corresponding directed edge which stores the common items of the two rowids. Each row is given an integer according to its coming order and the DAG follows that order. A directed acyclic graph records the relation between rows and items by doing AND(&) operation with the nodes' binary code of the edges. We also present DAGHDDM which is a new approach for mining frequent closed itemsets in high dimensional datasets. In this algorithm, we adopt the BitTable to compress the dataset firstly, and then construct DAG according to the BitTable. We increase the same items of the adjacent edges to implement pattern growth, traverse the DAG in reversal way and adopt a close-checking method to generate all frequent closed itemsets. It scans the dataset only once and does not generate candidate itemsets. The experimental results show that the proposed DAGHDDM algorithm can decrease the cost of time.
To construct Anhui-Styled Architecture (ASA) models rapidly and automatically, we proposed an automatic modeling method by analyzing the basic structure of ASA in-depth. Firstly, we built modules' database, compos...
详细信息
To construct Anhui-Styled Architecture (ASA) models rapidly and automatically, we proposed an automatic modeling method by analyzing the basic structure of ASA in-depth. Firstly, we built modules' database, composition rule database and repository database of ASA. Then, we translated each module of architecture into a node of graph and traverse these nodes using Breadth-First Traversal(BFS) algorithm of Graph to get descript document of single building. Finally, large scale scene of ASA were constructed automatically by combine the descript document and large scale ground scenes. Experimental results show that our method is rapid and effective for constructing ASA models.
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi...
详细信息
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of this study was to examine the role of high dose DHPG in the generation of oscillatory field activity at gamma frequency in the medical septal diagonal band of Broca (MSDB) slice prepared from rat brain, and to determine the phase relationship between spikes and gamma oscillations. The high dose DHPG induced large amplitude field population spiking activity, which is correlated linearly with the field gamma oscillations. The relationship between timing of spikes and the phase of gamma oscillation was determined by an analysis of circular statistics. Further analysis with Rayleigh test revealed that the relationship of phase-locking between spikes and gamma rhythm is of statistical significance. These data demonstrate that DHPG-sensitive neuronal networks within medial septum are able to generate gamma oscillations which are modulated by large amplitude population spikes and phase-locking of spikes to the gamma rhythm suggest the role of memory enhancement in the presence of mGluR1 activation.
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator ana...
详细信息
Synchronization decay of resting state EEG has shown that cognitive dysfunction in mild cognitive impairment (MCI) was relevant to a loss of functional connectivity in intermediate frequency bands. A new estimator analysis method called new S estimator (NSE) proposed recently by us quantifies synchronization between neuronal signals at multiple *** paper meant to explore the behavior of synchronization of multichannel EEG in MCI and healthy normal controls at rest, and preliminarily make clear the clinical significance of the NSE in MCI *** (EEG) were recorded from 10 MCI patients and 12 age-matched healthy normal controls (NC). NSE values were computed both across the all frequency band and separately in the delta, theta, alpha, beta (including beta1, beta2 and beta3), and gamma bands. The Montreal Cognitive Assessment (MoCA) was used to assess the symptom severity of MCI patients and *** values in the alpha and beta1 bands were significantly lower in MCI patients than in NC. NSE values in the alpha and beta1 bands were positively correlated with the MoCA scores in all participants (MCI and NC). In MCI patients, NSE values in the alpha and beta1 bands were also positively correlated with MoCA *** results suggest that NSE values are a useful correlate of EEG synchronization in MCI patients.
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor...
详细信息
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algorithm BVDAHL based on bit vector decomposition and hash linklist for mining frequent patterns on data streams which solves the above issues, is proposed. The itemsets (transactions) whose corresponding number of 1 is k, denoted as k-one itemsets (k-one transactions). The arrival transactions are converted into bit vectors, and permutations and combinations are used to decompose converted results, then the decomposed itemsets are stored in the hash linklist. In hash function, according to the position of 1 of bit vector to compute the address, if the transaction has same address and same content that already exists in data domain, then the value adds one in count domain, otherwise the pointer in pointer domain points to the next node directly, it is no need to deal with conflict. Afterwards the property of anti-monotonic will be used to prune the k+1-one transactions in bit vector table if there exists infrequent k-one itemsets that decomposed by such k+1-one transactions. Then the algorithm repeats the above processes until the transaction in bit vector table can not be decomposed. Finally we will receive the frequent itemsets by comparing the obtained value of count domain in hash linklist with minSup. Experiment results show that BVDAHL is very efficiency and scalable.
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of...
详细信息
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of current CCS and Z systems, where CCS is good at describing concurrent systems, also Z is a good tool for data structure. As a result, form the new system CCS-Z. Then we give the syntax and semantics of it, at last give the model checking *** advantage of this paper is combined data stucture on the famous system CCS, and increase the capacity of system description.
暂无评论