-
521
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
522
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation
Published 2022-04-01“…The neural network approach has been commonly used in computer vision tasks.However, adversarial examples are able to make a neural network generate a false prediction.Adversarial training has been shown to be an effective approach to defend against the impact of adversarial examples.Nevertheless, it requires high computing power and long training time thus limiting its application scenarios.An adversarial examples defense method based on knowledge distillation was proposed, reusing the defense experience from the large datasets to new classification tasks.During distillation, teacher model has the same structure as student model and the feature map vector was used to transfer experience, and clean samples were used for training.Multi-dimensional feature maps were utilized to enhance the semantic information.Furthermore, an attention mechanism based on feature map was proposed, which boosted the effect of distillation by assigning weights to features according to their importance.Experiments were conducted over cifar100 and cifar10 open-source dataset.And various white-box attack algorithms such as FGSM (fast gradient sign method), PGD (project gradient descent) and C&W (Carlini-Wagner attack) were applied to test the experimental results.The accuracy of the proposed method on Cifar10 clean samples exceeds that of adversarial training and is close to the accuracy of the model trained on clean samples.Under the PGD attack of L2 distance, the efficiency of the proposed method is close to that of adversarial training, which is significantly higher than that of normal training.Moreover, the proposed method is a light-weight adversarial defense method with low learning cost.The computing power requirement is far less than that of adversarial training even if optimization schemes such as attention mechanism and multi-dimensional feature map are added.Knowledge distillation can learn the decision-making experience of normal samples and extract robust features as a neural network learning scheme.It uses a small amount of data to generate accurate and robust models, improves generalization, and reduces the cost of adversarial training.…”
Get full text
Article -
523
Implementation of Minimum Antenatal Care Service Standards in North Lampung Regency
Published 2024-04-01“…The sample size was determined using the open-source calculator SSPropor (OpenEpi, version 3), resulting in 595 collected samples for this study. …”
Get full text
Article -
524
Identifying Incident Causal Factors to Improve Aviation Transportation Safety: Proposing a Deep Learning Approach
Published 2021-01-01“…First, we prepare the data sets used for training, validation, and testing with approximately 200,000 qualified incident reports from the Aviation Safety Reporting System (ASRS). Then, we take an open-source natural language model, which is well trained with a large corpus of Wikipedia texts, as the baseline and fine-tune it with the texts in incident reports to make it more suited to our specific research task. …”
Get full text
Article -
525
A portable electrochemical immunosensor for detection of S. aureus based on polyelectrolyte-modified screen-printed carbon electrode
Published 2025-02-01“…Voltammetric detection of the formation of the sandwich immunocomplex with secondary antibody in the outermost layer (AB–AG–AB-HRP) not only decreases the detection limit to 230 CFU/mL and expands the linear range of detection to 103–108 CFU/mL, but also could detect S. aureus bacteria with a portable open-source custom potentiostat in voltammetric mode, which is promising for non-invasive point-of-care monitoring of pathogens and addresses issues of antibody-based sensors, such as high cost and difficult chemical modification.…”
Get full text
Article -
526
OCF Bridging Techniques for UWB/LoRa IoT Ecosystems
Published 2022-01-01“…The OCF has developed not only its own standard but also an open source software framework called IoTivity for efficient implementation of IoT systems. …”
Get full text
Article -
527
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis Environments
Published 2025-01-01“…In this work, we introduce a novel framework called Datalab as a Service which integrates cutting-edge and open-source technologies to offer an online platform designed for both resource providers and researchers. …”
Get full text
Article -
528
A computational tool to infer enzyme activity using post-translational modification profiling data
Published 2025-01-01“…The JUMPsem program is scalable and publicly available as an open-source R package and user-friendly web-based R/Shiny app. …”
Get full text
Article -
529
Analyzing Transit Systems Using General Transit Feed Specification (GTFS) by Generating Spatiotemporal Transit Networks
Published 2025-01-01“…<i>GTFS2STN</i> is a new tool that converts General Transit Feed Specification (GTFS) data into spatiotemporal networks, addressing the lack of open-source solutions for transit analysis. The tool includes a web application that generates isochrone maps and calculates travel time variability between locations. …”
Get full text
Article -
530
Determining Dust Sources of Middle East and Assessing Their Impact on Agricultural Lands in Euphrates-Tigris River Basin (Syria-Iraq)
Published 2018-04-01“…This study was carried out in order to determine the dust sources in the Middle status of Middle East region between 2000-2015years have been analyzed using Collect earth methodology initiated by United Nations Food AND Agriculture Organized (FAO) in Antalya/Turkey on July 2015 and the results were reported by FAO.As being free of charge and an open source tool, the Collect Earth software uses very high resolution multi-temporal images from Google Earth and Bing Maps. …”
Get full text
Article -
531
Tracing the 2018 Sulawesi Earthquake and Tsunami’s Impact on Palu, Indonesia: A Remote Sensing Analysis
Published 2025-01-01“…Unlike many studies that rely on advanced or proprietary tools, we demonstrate that comparable results can be achieved with cost-effective open-source data and straightforward methodologies. …”
Get full text
Article -
532
An Interactive Computational Pipeline to Investigate Ventricular Hemodynamics with Real‐Time Three‐Dimensional Echocardiography and Computational Fluid Dynamics
Published 2025-01-01“…In this work, we introduce IP‐HEART—an interactive and open‐source computational pipeline to perform geometry processing for CFD models of ventricular blood flow. …”
Get full text
Article -
533
Cross-project software defect prediction based on the reduction and hybridization of software metrics
Published 2025-01-01“…The experimental analysis conducted using nine open-source projects from the PROMISE dataset demonstrates that RH-CPDP surpasses current CPDP methods (TCSBoost, TPTL, DA-KTSVMO, DBN, and 3SW-MSTL) regarding area under the curve (AUC) and F1-measure. …”
Get full text
Article -
534
A Machine Learning Approach for the Autonomous Identification of Hardness in Extraterrestrial Rocks from Digital Images
Published 2024-12-01“…The model is used to predict the hardness distribution of extraterrestrial rocks using images from the Tianwen-1 Mars Rover Navigation and Terrain Camera (NaTeCam) and a simulated lunar rock dataset from an open-source website. The results demonstrate the method’s potential for enhancing extraterrestrial exploration.…”
Get full text
Article -
535
Analysis of Water Surface Ratio Evolution in Guangdong-Hong Kong-Macao Greater Bay Area Based on Landsat
Published 2022-01-01“…An appropriate urban water surface ratio plays a vital role in improving the ecological quality of urban areas and the quality of urban living space.By RS and GIS technology,the research takes the free and open source optical remote sensing data,Landsat images,as the data source and uses the normalized difference water index (NDWI) and the normalized difference vegetation index (NDVI) to construct an automatic water body discrimination model.In this way,we can analyze the evolution of the water surface ratio in the core cities of the Guangdong-Hong Kong-Macao Greater Bay Area (Greater Bay Area) in the past two decades.The result analysis reveals that in the past 20 years,the water area of the Greater Bay Area has been decreased by 136 km<sup>2</sup>,and the water surface ratio is reduced from 4.48% to 4.22%.Among the cities in the Greater Bay Area,the city with the largest reduction in the water area is Jiangmen,with a decline of 44.20 km<sup>2</sup>,and its water surface ratio falls from 6.10% to 5.62%.Foshan follows Jiangmen,with a water area decrease of 32.34 km<sup>2</sup>,and its water surface ratio drops from 13.17% to 12.32%.The water area in Macao,Hong Kong,Huizhou,and Zhaoqing demonstrates a fall of not more than 10 km<sup>2</sup>,and that in Guangzhou and Shenzhen is reduced by not more than 20 km<sup>2</sup>.By the transition matrix analysis of land use types in the Greater Bay Area,we can uncover the main reason for the decline in water area—that is,the increase in construction land invading the original water area.The result of this paper can provide theoretical and methodological support for the rational use of water resources and the construction of water ecology in the cities of the Greater Bay Area.Meanwhile,it can offer an important reference for promoting the construction of ecological civilization and strengthening environmental protection in the Greater Bay Area.…”
Get full text
Article -
536
Kidney Segmentation in Renal Magnetic Resonance Imaging - Current Status and Prospects
Published 2021-01-01“…We also provide pointers to open source software related to renal image segmentation.…”
Get full text
Article -
537
Validation Psychometrical analysis of Sexual Machism Scale (EMS-Sexism-12) among university students from Arequipa, Peru
Published 2023-09-01“…Results: The data were analysed using CFA and the WLSMV estimator along with polychoric correlation matrices in the open-source software Rstudio. The analysis revealed a unidimensional model with good fit indices for both men (CFI = .924, TLI = .907, SMRM = 0.069) and women (CFI = .936, TLI = .922, SMRM = 0.051). …”
Get full text
Article -
538
Refactoring BZIP2 on the new‐generation sunway supercomputer
Published 2025-01-01“…In particular, the BZIP2 lossless compression algorithm has been widely used due to its exceptional compression ratio, moderate compression speed, high reliability, and open‐source nature. This paper focuses on the design and realization of a parallelized BZIP2 algorithm tailored for deployment on the New‐Generation Sunway supercomputing platform. …”
Get full text
Article -
539
MBI-KG: A knowledge graph of structured and linked economic research data extracted from the 1937 book “Die Maschinen-Industrie im Deutschen Reich”MADATA
Published 2025-02-01“…The semantically enriched data was uploaded into an open-source knowledge-graph software. The resulting knowledge graph includes detailed information about companies, individuals, and administrative entities relevant to the German mechanical engineering industry. …”
Get full text
Article -
540
Medyalararası Gündem Belirleme Çalışmalarında R Stüdyo Kullanımı: Rozelle-Campbell Taban Hizası ile Çapraz Gecikmeli Korelasyonun Bilişimleştirilmesi
Published 2020-06-01“…It is licensed for a free and an open-source software. There are many researchers have released applications for general use in “R” after they have been introduced into the literature. …”
Get full text
Article