Discovery of Network Information Content Security Incidents Based on CCGA

2014 ◽  
Vol 11 (15) ◽  
pp. 5487-5498
Author(s):  
Lin Ge
2013 ◽  
Vol 2013 ◽  
pp. 1-3 ◽  
Author(s):  
Pantelimon-George Popescu ◽  
Florin Pop ◽  
Alexandru Herişanu ◽  
Nicolae Ţăpuş

We refine a classical logarithmic inequality using a discrete case of Bernoulli inequality, and then we refine furthermore two information inequalities between information measures for graphs, based on information functionals, presented by Dehmer and Mowshowitz in (2010) as Theorems 4.7 and 4.8. The inequalities refer to entropy-based measures of network information content and have a great impact for information processing in complex networks (a subarea of research in modeling of complex systems).


2014 ◽  
Vol 687-691 ◽  
pp. 1297-1299
Author(s):  
Ai Xia Han ◽  
Yan Chen

With the rapid development of network information technology, much attention has been paid to the database content security problems,such as how to prevent data theft, illegal copying, certification of copyright, etc. In order to protect the database copyright, digital watermarking technology is becoming a new research hotspot. In this paper, first of all, on the basis of summary current development of data and database watermarking technology, and then introduces genetic algorithm in data watermark technology, finally validates the effectiveness of the model with an example.


2010 ◽  
Vol 215 (12) ◽  
pp. 4263-4271 ◽  
Author(s):  
Matthias Dehmer ◽  
Abbe Mowshowitz

Author(s):  
А.Н. Цибуля ◽  
А.И. Козачок ◽  
В.М. Козлова

В статье рассматривается оптимизированный подход к контролю инцидентов информационной безопасности компьютерной сети и обнаружению аномалий. Обоснована необходимость использования алгоритма «усечения» полного множества факторов нарушения политики информационной безопасности. The article considers an optimized approach to monitoring computer network information security incidents and detecting anomalies. The necessity of using the algorithm of «truncation» of the full set of factors of violation of the information security policy is justified.


Sign in / Sign up

Export Citation Format

Share Document