首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document 基于云模型的文本文档认证零水印算法
Xitong Qi, Yuling Liu
Content authentication of text document has become a major concern in the current digital era. In this paper, a zero-watermark algorithm is proposed for Chinese text documents content authentication. Firstly, the frequencies of different part-of-speech (POS) tags are obtained through natural language processing technology. And they are used to calculate the expect value and entropy, which can be as text features. Then a watermark is generated by one-dimensional forward cloud model generator using the expect value and entropy. The watermark is sent to be registered and stored in the trusted third party called Certificate Authority (CA). If authentication is necessary, we calculate the similarity between the watermark of disputed text and its watermark registered in CA. Experimental results show that the algorithm is robust against content-preserving attacks while sensitive to malicious tampering.
文本文档的内容认证已成为当今数字时代人们关注的焦点。本文提出了一种用于中文文本文档内容认证的零水印算法。首先,通过自然语言处理技术获取不同词性标签的频率;用它们来计算期望值和熵,作为文本特征。然后利用期望值和熵,利用一维正演云模生成器生成水印。水印被发送到被称为证书颁发机构(CA)的可信第三方进行注册和存储。如果需要认证,我们计算争议文本的水印与CA注册的水印之间的相似度。实验结果表明,该算法对内容保留攻击具有鲁棒性,同时对恶意篡改敏感。
{"title":"Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document","authors":"Xitong Qi, Yuling Liu","doi":"10.1109/CIS.2013.155","DOIUrl":"https://doi.org/10.1109/CIS.2013.155","url":null,"abstract":"Content authentication of text document has become a major concern in the current digital era. In this paper, a zero-watermark algorithm is proposed for Chinese text documents content authentication. Firstly, the frequencies of different part-of-speech (POS) tags are obtained through natural language processing technology. And they are used to calculate the expect value and entropy, which can be as text features. Then a watermark is generated by one-dimensional forward cloud model generator using the expect value and entropy. The watermark is sent to be registered and stored in the trusted third party called Certificate Authority (CA). If authentication is necessary, we calculate the similarity between the watermark of disputed text and its watermark registered in CA. Experimental results show that the algorithm is robust against content-preserving attacks while sensitive to malicious tampering.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Software Supportable Tasks Related with ISO/IEC 15408 与ISO/IEC 15408相关的软件可支持任务分析
Ning Zhang, A. Suhaimi, Y. Goto, Jingde Cheng
From the perspective of information security engineering, ISO/IEC 15408, one of ISO/IEC security standards, plays an important role to ensure the whole security of an information/software system. ISO/IEC 15408 is a complex security standard which requires involvement of wide range of participants to perform a quite number of tasks as well as various documents. ISO/IEC 15408 is periodically reviewed and maintained to achieve ongoing improvement so that workflow of tasks and contents/format of documents related with the standard are changed according to changes of the standards. Consequently, it is difficult to do all of the tasks related with ISO/IEC 15408 without any supporting tools. However, there is no study to identify which tasks related with ISO/IEC 15408 can be supported by software tools. Indeed, no one makes clear what the tasks and participants exist. This paper presents the first analysis to identify all software supportable tasks related with ISO/IEC 15408. The paper enumerates all of the participants, documents, and tasks related with ISO/IEC 15408 and shows relationship among them, and identifies all software supportable tasks. The analysis and its results become a basis to construct an information security engineering environment based on ISO/IEC 15408 for ensuring the whole security of an information/software system.
从信息安全工程的角度来看,ISO/IEC 15408作为ISO/IEC安全标准之一,对保证信息/软件系统的整体安全起着重要的作用。ISO/IEC 15408是一个复杂的安全标准,需要广泛的参与者参与执行相当多的任务以及各种文件。ISO/IEC 15408定期评审和维护,以实现持续改进,使与标准相关的工作流程和文件的内容/格式根据标准的变化而变化。因此,如果没有任何支持工具,很难完成与ISO/IEC 15408相关的所有任务。然而,没有研究确定哪些与ISO/IEC 15408相关的任务可以由软件工具支持。事实上,没有人清楚地知道存在什么任务和参与者。本文提出了第一个分析,以确定与ISO/IEC 15408相关的所有软件支持任务。本文列举了所有与ISO/IEC 15408相关的参与者、文档和任务,并显示了它们之间的关系,并确定了所有软件支持的任务。分析结果为构建基于ISO/IEC 15408标准的信息安全工程环境,保证信息/软件系统的整体安全提供了依据。
{"title":"An Analysis of Software Supportable Tasks Related with ISO/IEC 15408","authors":"Ning Zhang, A. Suhaimi, Y. Goto, Jingde Cheng","doi":"10.1109/CIS.2013.132","DOIUrl":"https://doi.org/10.1109/CIS.2013.132","url":null,"abstract":"From the perspective of information security engineering, ISO/IEC 15408, one of ISO/IEC security standards, plays an important role to ensure the whole security of an information/software system. ISO/IEC 15408 is a complex security standard which requires involvement of wide range of participants to perform a quite number of tasks as well as various documents. ISO/IEC 15408 is periodically reviewed and maintained to achieve ongoing improvement so that workflow of tasks and contents/format of documents related with the standard are changed according to changes of the standards. Consequently, it is difficult to do all of the tasks related with ISO/IEC 15408 without any supporting tools. However, there is no study to identify which tasks related with ISO/IEC 15408 can be supported by software tools. Indeed, no one makes clear what the tasks and participants exist. This paper presents the first analysis to identify all software supportable tasks related with ISO/IEC 15408. The paper enumerates all of the participants, documents, and tasks related with ISO/IEC 15408 and shows relationship among them, and identifies all software supportable tasks. The analysis and its results become a basis to construct an information security engineering environment based on ISO/IEC 15408 for ensuring the whole security of an information/software system.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study 一个高可靠和高性能的数据分布策略:一个RAID-5案例研究
Saifeng Zeng, Ligu Zhu, Lei Zhang
With the development of the storage medium, such as the emerging of the SSD, the tradition way of data distribution can't keep up with the pace of the storage device development. Specifically, for example, Traditional RAID only enhanced the performance or reliability in the single storage medium and all the data are distributed in the same storage medium. But with the wide range of using raid, the problem of RAID data adventure has come to the surface gradually. Furthermore, under the mode of RAID-5 read modify-write (R-M-W), operation system collapse or the storage medium write error would lead to the damage of data, which could not be recovered and this problem is named write hole. According to the above problem, this paper proposes a new data distribution strategy, which is called high reliable and performance data distribution strategy (RPDD). RPDD use the high performance storage medium as a cache which is named storage cache. The most of the data is wrote to the storage cache and then distribute the data to the other logic relationship storage medium. As a result, the data is distributed in a hybrid storage medium. In order to take a better analysis of the RPDD in the next, we have combined RPDD in the RAID-5, which is named RAID-5-RPDD. RAID5-RPDD employs the dynamic scheduling mechanism, data transfer and hybrid consistency mechanism between the SSD and magnetic media storage devices to resolve the problem. In consequence, it can protect the RAID stripe data consistency under the condition of R-M-W and increase the I/O performance without the impact of the cost. In addition, it can improve the reliability of the RAID-5. The simulation test results show that RAID-5-RPDD I/O performance increase at the range of 9% with little penalty of the resource consumption.
随着存储介质的发展,如SSD的出现,传统的数据分发方式已经跟不上存储设备发展的步伐。例如,传统的RAID只是提高单个存储介质的性能或可靠性,所有的数据都分布在同一个存储介质中。但是随着raid的广泛应用,raid数据冒险问题也逐渐浮出水面。此外,在RAID-5读修改写(R-M-W)模式下,操作系统崩溃或存储介质写错误会导致数据损坏,无法恢复,这种问题被称为写洞。针对上述问题,本文提出了一种新的数据分发策略,即高可靠高性能数据分发策略(RPDD)。RPDD使用高性能存储介质作为缓存,称为存储缓存。大部分数据被写入存储缓存,然后分发到其他逻辑关系存储介质中。因此,数据分布在混合存储介质中。为了在下文中更好地分析RPDD,我们将RPDD合并到RAID-5中,命名为RAID-5-RPDD。RAID5-RPDD采用固态硬盘与磁性介质存储设备之间的动态调度机制、数据传输和混合一致性机制来解决这一问题。因此,它可以在不影响成本的情况下,保护RAID分条数据在读写条件下的一致性,提高I/O性能。此外,还可以提高RAID-5的可靠性。模拟测试结果表明,RAID-5-RPDD I/O性能提高了9%,而资源消耗的损失很小。
{"title":"A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study","authors":"Saifeng Zeng, Ligu Zhu, Lei Zhang","doi":"10.1109/CIS.2013.74","DOIUrl":"https://doi.org/10.1109/CIS.2013.74","url":null,"abstract":"With the development of the storage medium, such as the emerging of the SSD, the tradition way of data distribution can't keep up with the pace of the storage device development. Specifically, for example, Traditional RAID only enhanced the performance or reliability in the single storage medium and all the data are distributed in the same storage medium. But with the wide range of using raid, the problem of RAID data adventure has come to the surface gradually. Furthermore, under the mode of RAID-5 read modify-write (R-M-W), operation system collapse or the storage medium write error would lead to the damage of data, which could not be recovered and this problem is named write hole. According to the above problem, this paper proposes a new data distribution strategy, which is called high reliable and performance data distribution strategy (RPDD). RPDD use the high performance storage medium as a cache which is named storage cache. The most of the data is wrote to the storage cache and then distribute the data to the other logic relationship storage medium. As a result, the data is distributed in a hybrid storage medium. In order to take a better analysis of the RPDD in the next, we have combined RPDD in the RAID-5, which is named RAID-5-RPDD. RAID5-RPDD employs the dynamic scheduling mechanism, data transfer and hybrid consistency mechanism between the SSD and magnetic media storage devices to resolve the problem. In consequence, it can protect the RAID stripe data consistency under the condition of R-M-W and increase the I/O performance without the impact of the cost. In addition, it can improve the reliability of the RAID-5. The simulation test results show that RAID-5-RPDD I/O performance increase at the range of 9% with little penalty of the resource consumption.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Vocal Segments Detection in Popular Music 自动声乐片段检测在流行音乐
Liming Song, Ming Li, Yonghong Yan
We propose a technique for the automatic vocal segments detection in an acoustical polyphonic music signal. We use a combination of several characteristics specific to singing voice as the feature and employ a Gaussian Mixture Model (GMM) classifier for vocal and non-vocal classification. We have employed a pre-processing of spectral whitening and archived a performance of 81.3% over the RWC popular music dataset.
提出了一种声学复调音乐信号中人声片段的自动检测技术。我们使用歌唱声音特定的几个特征的组合作为特征,并使用高斯混合模型(GMM)分类器进行声乐和非声乐分类。我们采用了光谱白化预处理,并在RWC流行音乐数据集上存档了81.3%的性能。
{"title":"Automatic Vocal Segments Detection in Popular Music","authors":"Liming Song, Ming Li, Yonghong Yan","doi":"10.1109/CIS.2013.80","DOIUrl":"https://doi.org/10.1109/CIS.2013.80","url":null,"abstract":"We propose a technique for the automatic vocal segments detection in an acoustical polyphonic music signal. We use a combination of several characteristics specific to singing voice as the feature and employ a Gaussian Mixture Model (GMM) classifier for vocal and non-vocal classification. We have employed a pre-processing of spectral whitening and archived a performance of 81.3% over the RWC popular music dataset.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coercion: A Distributed Clustering Algorithm for Categorical Data 强制:分类数据的分布式聚类算法
Bin Wang, Yang Zhou, Xinhong Hei
Clustering is an important technology in data mining. Squeezer is one such clustering algorithm for categorical data and it is more efficient than most existing algorithms for categorical data. But Squeezer is time consuming for very large datasets which are distributed in different servers. Thus, we employ the distributed thinking to improve Squeezer and a distributed algorithm for categorical data called Coercion is proposed in this paper. In order to present detailed complexity results for Coercion, we also conduct an experimental study with standard as well as synthetic data sets to demonstrate the effectiveness of the new algorithm.
聚类是数据挖掘中的一项重要技术。Squeezer算法就是这样一种分类数据聚类算法,它比大多数现有的分类数据聚类算法都要高效。但是对于分布在不同服务器上的大型数据集来说,Squeezer非常耗时。因此,我们采用分布式思维对Squeezer进行改进,并提出了一种分类数据的分布式强制算法。为了提供详细的强制复杂性结果,我们还使用标准和合成数据集进行了实验研究,以证明新算法的有效性。
{"title":"Coercion: A Distributed Clustering Algorithm for Categorical Data","authors":"Bin Wang, Yang Zhou, Xinhong Hei","doi":"10.1109/CIS.2013.149","DOIUrl":"https://doi.org/10.1109/CIS.2013.149","url":null,"abstract":"Clustering is an important technology in data mining. Squeezer is one such clustering algorithm for categorical data and it is more efficient than most existing algorithms for categorical data. But Squeezer is time consuming for very large datasets which are distributed in different servers. Thus, we employ the distributed thinking to improve Squeezer and a distributed algorithm for categorical data called Coercion is proposed in this paper. In order to present detailed complexity results for Coercion, we also conduct an experimental study with standard as well as synthetic data sets to demonstrate the effectiveness of the new algorithm.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parametric Study of Fuzzy Number Linear Programming 模糊数线性规划的参数化研究
Yanling Jia, Yan Yang, Yihua Zhong
This paper is devoted to show the effect of the continuous variational parameter in the objective function coefficients on the optimum solution, which is an extension of the sensitivity analysis of fuzzy number linear programming. We prove that if the parameter is in a certain range, this problem has a unique optimal solution, otherwise it has non-unique optimal solutions or is unbounded or infeasible. Then, the optimal value function is a fuzzy linear function of the parameter. Finally, numerical examples demonstrate the theorem and illustrate the computational procedure.
本文研究了目标函数系数中连续变分参数对最优解的影响,这是模糊数线性规划灵敏度分析的推广。证明了如果参数在一定范围内,则该问题存在唯一最优解,否则问题存在非唯一最优解或无界或不可行的。然后,最优值函数是参数的模糊线性函数。最后,通过数值算例对定理进行了验证,并举例说明了计算过程。
{"title":"Parametric Study of Fuzzy Number Linear Programming","authors":"Yanling Jia, Yan Yang, Yihua Zhong","doi":"10.1109/CIS.2013.78","DOIUrl":"https://doi.org/10.1109/CIS.2013.78","url":null,"abstract":"This paper is devoted to show the effect of the continuous variational parameter in the objective function coefficients on the optimum solution, which is an extension of the sensitivity analysis of fuzzy number linear programming. We prove that if the parameter is in a certain range, this problem has a unique optimal solution, otherwise it has non-unique optimal solutions or is unbounded or infeasible. Then, the optimal value function is a fuzzy linear function of the parameter. Finally, numerical examples demonstrate the theorem and illustrate the computational procedure.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems 一种改进的基于控制的多目标问题进化算法
Lei Fan, Xiyang Liu
We proposed a new evolutionary algorithm for multiobjective optimization problems. The influence of constraints on search space and Pareto front are analyzed first. According to the analysis, a new clustering method based on domination is proposed, in which the infeasible solutions are employed. Then, aiming to converge to Pareto fronts of the multiobjective problems quickly, a differential evolution based crossover operator is designed. In the designed crossover operator, uniform design method was used. At last, a square search method is employed to update the feasible nondominated solutions to improve the precision. Experiments on 10 selected test problems and comparisons with NSGA-II are made. Simulation results indicate that our proposal is effective and sound, and our proposal outperforms NSGA-II on the selected test problems.
针对多目标优化问题,提出了一种新的进化算法。首先分析了约束条件对搜索空间和帕累托前沿的影响。在此基础上,提出了一种新的基于控制的聚类方法,该方法采用不可行解。然后,为了使多目标问题快速收敛到Pareto前沿,设计了一种基于差分进化的交叉算子。设计的交叉算子采用均匀设计方法。最后,采用平方搜索法对可行非支配解进行更新,提高求解精度。选取10个测试问题进行了实验,并与NSGA-II进行了比较。仿真结果表明,我们的方案是有效和合理的,我们的方案在选定的测试问题上优于NSGA-II。
{"title":"An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems","authors":"Lei Fan, Xiyang Liu","doi":"10.1109/CIS.2013.27","DOIUrl":"https://doi.org/10.1109/CIS.2013.27","url":null,"abstract":"We proposed a new evolutionary algorithm for multiobjective optimization problems. The influence of constraints on search space and Pareto front are analyzed first. According to the analysis, a new clustering method based on domination is proposed, in which the infeasible solutions are employed. Then, aiming to converge to Pareto fronts of the multiobjective problems quickly, a differential evolution based crossover operator is designed. In the designed crossover operator, uniform design method was used. At last, a square search method is employed to update the feasible nondominated solutions to improve the precision. Experiments on 10 selected test problems and comparisons with NSGA-II are made. Simulation results indicate that our proposal is effective and sound, and our proposal outperforms NSGA-II on the selected test problems.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122477927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Botnet-Oriented Collaborative Defense Scheme Description Language 面向僵尸网络的协同防御方案描述语言
Liming Huan, Yang-Zhe Yu, Liangshuang Lv, Shiying Li, Chunhe Xia
Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a conceptual model of botnet collaborative defense scheme and designed a Botnet Collaborative Defense Scheme Description Language (BCDSDL).Then, we outlined its EBNF expressions. The BCDSDL can uniformly describe the defense tasks and relations among tasks of different kinds of security devices, and provides a language level interface for diverse security devices achieving information sharing and linkage defense. At last, we realized the simulation of collaborative defense schemes described by BCDSDL in GTNetS. The experiment results show that BCDSDL is efficient and easy to use.
僵尸网络是对互联网安全最严重的威胁之一。孤立的、单点的安全防御技术无法有效抵御大规模、分布式的僵尸网络攻击,如垃圾邮件、分布式拒绝服务攻击等。不同类型的安全设备之间需要协作。针对这一问题,提出了僵尸网络协同防御方案的概念模型,并设计了僵尸网络协同防御方案描述语言(BCDSDL)。然后,我们概述了它的EBNF表达式。BCDSDL可以统一描述不同类型安全设备的防御任务和任务间的关系,为不同类型的安全设备提供语言级接口,实现信息共享和联动防御。最后,在GTNetS中实现了BCDSDL描述的协同防御方案的仿真。实验结果表明,BCDSDL是一种高效且易于使用的算法。
{"title":"A Botnet-Oriented Collaborative Defense Scheme Description Language","authors":"Liming Huan, Yang-Zhe Yu, Liangshuang Lv, Shiying Li, Chunhe Xia","doi":"10.1109/CIS.2013.143","DOIUrl":"https://doi.org/10.1109/CIS.2013.143","url":null,"abstract":"Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a conceptual model of botnet collaborative defense scheme and designed a Botnet Collaborative Defense Scheme Description Language (BCDSDL).Then, we outlined its EBNF expressions. The BCDSDL can uniformly describe the defense tasks and relations among tasks of different kinds of security devices, and provides a language level interface for diverse security devices achieving information sharing and linkage defense. At last, we realized the simulation of collaborative defense schemes described by BCDSDL in GTNetS. The experiment results show that BCDSDL is efficient and easy to use.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121094594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Trade Duration of HS300 Index Based on ACD Model 基于ACD模型的HS300指数交易期研究
Yuling Ma, Yuan Zhao
This paper analyses the trade duration of HS300 index ultra-high frequency data using ACD model. First, we research the amplitude characteristics of the volatility in spatial direction, and analyze the density characteristics of the volatility in time axis. Then from the angle of the three-dimensional we make a comprehensive analysis on high frequency data in space and time. Finally, by constructing an EACD (1, 1) model to fit transaction duration, we find that there exists a bigger fluctuation in the transaction duration, and that sometimes trade is in a state of very inactive.
本文运用ACD模型对HS300指数超高频数据的交易时间进行了分析。首先,研究了波动率在空间方向上的振幅特征,分析了波动率在时间轴上的密度特征。然后从三维的角度对高频数据进行空间和时间上的综合分析。最后,通过构建EACD(1,1)模型拟合交易持续时间,我们发现交易持续时间存在较大的波动,有时交易处于非常不活跃的状态。
{"title":"Research on the Trade Duration of HS300 Index Based on ACD Model","authors":"Yuling Ma, Yuan Zhao","doi":"10.1109/CIS.2013.164","DOIUrl":"https://doi.org/10.1109/CIS.2013.164","url":null,"abstract":"This paper analyses the trade duration of HS300 index ultra-high frequency data using ACD model. First, we research the amplitude characteristics of the volatility in spatial direction, and analyze the density characteristics of the volatility in time axis. Then from the angle of the three-dimensional we make a comprehensive analysis on high frequency data in space and time. Finally, by constructing an EACD (1, 1) model to fit transaction duration, we find that there exists a bigger fluctuation in the transaction duration, and that sometimes trade is in a state of very inactive.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121095175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm 基于中间件的植物生长模拟冗余读取器消除模型
Shilei Lv, Shunzheng Yu
Eliminating redundant readers is a significant way to improve the performance of the radio frequency identification (RFID) networks. This paper proposes a middleware-based model for redundant reader elimination, which is formulated as a multi-dimensional optimization problem. It uses the data in RFID middleware to distinguish redundant readers and no "write-to-tag" operations are required. The Plant Growth Simulation Algorithm (PGSA) is employed to search the optimal adjustable parameters. The simulation results reveal that the proposed approach outperforms other algorithms in terms of optimization precision and computing time.
消除冗余读取器是提高无线射频识别(RFID)网络性能的重要途径。本文提出了一种基于中间件的冗余读取器消除模型,该模型被表述为一个多维优化问题。它使用RFID中间件中的数据来区分冗余读取器,不需要“写到标签”操作。采用植物生长模拟算法(PGSA)搜索最优可调参数。仿真结果表明,该方法在优化精度和计算时间上都优于其他算法。
{"title":"A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm","authors":"Shilei Lv, Shunzheng Yu","doi":"10.1109/CIS.2013.15","DOIUrl":"https://doi.org/10.1109/CIS.2013.15","url":null,"abstract":"Eliminating redundant readers is a significant way to improve the performance of the radio frequency identification (RFID) networks. This paper proposes a middleware-based model for redundant reader elimination, which is formulated as a multi-dimensional optimization problem. It uses the data in RFID middleware to distinguish redundant readers and no \"write-to-tag\" operations are required. The Plant Growth Simulation Algorithm (PGSA) is employed to search the optimal adjustable parameters. The simulation results reveal that the proposed approach outperforms other algorithms in terms of optimization precision and computing time.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1