2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
Audio Digital Watermarking Algorithm Based on Wavelet Analysis 基于小波分析的音频数字水印算法
Jie-Chang Wen
{"title":"Audio Digital Watermarking Algorithm Based on Wavelet Analysis","authors":"Jie-Chang Wen","doi":"10.1109/CIS.WORKSHOPS.2007.133","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.133","url":null,"abstract":"This article mainly researches on the principle of digital audio signal embedded watermarking and the usage of wavelet transform to realize the audio digital watermark embedding and extracting algorithm. This algorithm has good stealth and robustness. The influence of embedded watermarking on the original audio signal can not be found by human perceptual system and can resist the general signal attack.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133844638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RBTN: A Role-Based Trust Negotiation Model 基于角色的信任协商模型
Yizhu Zhao, Hongwei Lu
{"title":"RBTN: A Role-Based Trust Negotiation Model","authors":"Yizhu Zhao, Hongwei Lu","doi":"10.1109/CIS.WORKSHOPS.2007.171","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.171","url":null,"abstract":"TN/ATN is a new approach for establishing trust between strangers through the exchange of digital credentials and the use of access control policies. However, in TN/ATN, a user has to negotiate with the server each time he requests several resources or services from it and disclose credentials even if he had disclosed it before. In this paper, a Role-Based Trust Negotiation model (called RBTN) is proposed. RBTN introduces the role concept to trust negotiation, and assigns roles to users according to their credentials, which are disclosed during the previous negotiations. Thus RBTN can reduce the rounds of negotiation when one visits several resources or services one time. In the paper, we have a detailed description of RBTN. Thereto, a use case is given to show how the model works, which illustrates that RBTN is sound and reasonable.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"40 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arithmetic Model Research of IDS Alarm Controlling IDS报警控制算法模型研究
Qu Zhaoyang, Guo Liang, Wu Yan
{"title":"Arithmetic Model Research of IDS Alarm Controlling","authors":"Qu Zhaoyang, Guo Liang, Wu Yan","doi":"10.1109/CIS.WORKSHOPS.2007.230","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.230","url":null,"abstract":"In order to solve the high rate of wrong alarm in IDS, we designed alarm control model by analyzing alarming information. This model which using human olfaction passivation aims at the sustaining high frequency no-action alarming information in order to reduce rate of no-action alarming in IDS, achieve the low wrong alarming of IDS and make it convenient to administrators.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Spam Detection Based on Cognitive Pattern Recognition 基于认知模式识别的垃圾邮件检测研究
Tiancai Liang, Y. Pi
{"title":"On Spam Detection Based on Cognitive Pattern Recognition","authors":"Tiancai Liang, Y. Pi","doi":"10.1109/CIS.WORKSHOPS.2007.103","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.103","url":null,"abstract":"A spam detection method, based on cognitive pattern recognition, had been proposed. The connection between Email category and cognition of Email user interest within life and work, had been analyzed. Under the guidance of cognitive pattern recognition theory, the mechanism of spam detection, based on intelligent cognition of Email user interest within life and work, had been discussed. Then the spam detection algorithm and its concrete implementation was given. Experimental results demonstrate that the spam detection algorithm has a good learning ability, scalability, and a good ability to achieve high recognition accuracy.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research and Realization of Text Mining Algorithm on Web 基于Web的文本挖掘算法研究与实现
Shiqun Yin, Yuhui Qiu, Jike Ge
{"title":"Research and Realization of Text Mining Algorithm on Web","authors":"Shiqun Yin, Yuhui Qiu, Jike Ge","doi":"10.1109/CIS.WORKSHOPS.2007.212","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.212","url":null,"abstract":"It is recognized that text information on Web is growing at an astounding pace. Research and application of text mining on Web is an important branch in the data mining. Now people mainly use information retrieval (IR) or the search engine to look up Web information. But IR focuses on searching for information that is explicitly present but not latent knowledge in some document, the search engine can hardly according to different need of different customers and provide individual service, and it is very difficult to mine data further. However, text mining on Web aims to resolve this problem. This paper discusses an Algorithm of how to follow the appointed website or Web page according to the user's request by using the text mining technique, how to extract and express text characteristic, how to classify the data information with feedback judgement combined with the Web page text contents for later use. We present experiments on different data set that demonstrate more effectiveness of our algorithm than traditional algorithm. The process of Web text mining, information extraction method, mining algorithm and realization technique are discussed in details.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Security Operation Center Based on Immune System 基于免疫系统的安全运营中心
Yi Niu, Quan Zhang, Qilun Zheng, Hong Peng
{"title":"Security Operation Center Based on Immune System","authors":"Yi Niu, Quan Zhang, Qilun Zheng, Hong Peng","doi":"10.1109/CIS.WORKSHOPS.2007.125","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.125","url":null,"abstract":"With the widespread application of large and complicated network, network safety has become an important issue. In this paper, we design a security operation center (SOC) using an analogy of natural world immunology, We adopt an immune mechanism that distinguishes self from non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multi-agent language, which his an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trust-Contexts Modeling, Organization and Trust Estimation on the Web 基于Web的信任情境建模、组织与信任评估
Changli Zhang, Jian Wu, Zhengguo Hu
{"title":"Trust-Contexts Modeling, Organization and Trust Estimation on the Web","authors":"Changli Zhang, Jian Wu, Zhengguo Hu","doi":"10.1109/CIS.WORKSHOPS.2007.104","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.104","url":null,"abstract":"Trust-contexts, computational models of the situational factors of trust behaviors, play important roles in trust decisions, but their researches are still in infancy. In this paper, based on earlier studies, trust- contexts are modeled and organized globally on the Web. Then, the basic ideas and an extension of trust estimation, which is the core step of trust decision, are focused. At last, more extensional topics are presented.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Detection Arithmetic of Soft Decision Based on Non-ideal Channel in Distributed Detection 分布式检测中基于非理想信道的软判决检测算法
Ying-kun Liu, Xin-xi Feng
{"title":"The Detection Arithmetic of Soft Decision Based on Non-ideal Channel in Distributed Detection","authors":"Ying-kun Liu, Xin-xi Feng","doi":"10.1109/CIS.WORKSHOPS.2007.99","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.99","url":null,"abstract":"In this paper we expand the arithmetic of the distributed detection in two aspects. In order to improve the detection performance and use communicated resource rationally, the local decision is extended from hard decision to soft decision. According to N non-ideal independent channels, the local decision and reliability information are transmitted to the fusion center. The non-ideal channel is extended from binary symmetry channel to memorial channel. Then we derive the optimal decision form of the local detectors and fusion center by NP(Neyman pearson) rule. At last stimulation of two detectors shows that using soft decision improves the detection performance and worsen channel depress the detection performance surely.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending Ontology Language for Semantic Web 面向语义Web的本体语言扩展
Qing Yu, Jinlin Wang
{"title":"Extending Ontology Language for Semantic Web","authors":"Qing Yu, Jinlin Wang","doi":"10.1109/CIS.WORKSHOPS.2007.211","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.211","url":null,"abstract":"The paper focuses on how to represent and infer the imprecise or fuzzy knowledge in real world. Ontologies are important technology used to describe the semantics of information, which provide a formal specification of a shared conceptualization. OWL is a promising ontology language which is intended to provide a formal description of concepts, terms, and relationships within a given knowledge domain. Although OWL has a powerful expressive ability on knowledge, it has no capability to represent the uncertain and imprecise information. In this paper, we extend OWL by fuzzy logic called FOWL (fuzzy of OWL) for capturing imprecise or uncertain knowledge encountered in real world. In the end, we give an instance which shows that fuzzy information can be expressed well in the proposed ontology language.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-Based Distributed Conceptual Design of Virtual Prototyping for Complex Products 基于agent的复杂产品虚拟样机分布式概念设计
Chen Xi
{"title":"Agent-Based Distributed Conceptual Design of Virtual Prototyping for Complex Products","authors":"Chen Xi","doi":"10.1109/CIS.WORKSHOPS.2007.189","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.189","url":null,"abstract":"Integrating and sharing multidisciplinary model data and improving robusticity and validity of product conceptual design system in distributed environment is one of the key technical problems in Virtual Prototype design and simulation of complex products. After long time research on multi-agent systems, an agent-based product conceptual design system combining XML and Web Service technology was proposed, system architecture, communication style and system workflow were illustrated. Further more it discussed product conceptual design development process, decision arithmetic and gave a unified intelligent agent group form for electronic, software and control systems involved in virtual prototyping product conceptual design, realized a service-oriented, supporting distributed, heterogeneous and multi-field collaborative product conceptual design supporting platform.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信