期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Modeling the effects of mechanical parameters on the hydrodynamic behavior of vertical current classifiers 被引量:3
1
作者 Arabzadeh Jarkani Soroush Khoshdast Hamid +1 位作者 Shariat Elaheh Sam Abbas 《International Journal of Mining Science and Technology》 SCIE EI 2014年第1期123-127,共5页
This study modeled the effects of structural and dimensional manipulations on hydrodynamic behavior of a bench vertical current classifier. Computational fluid dynamics (CFD) approach was used as modeling method, an... This study modeled the effects of structural and dimensional manipulations on hydrodynamic behavior of a bench vertical current classifier. Computational fluid dynamics (CFD) approach was used as modeling method, and turbulent intensity and fluid velocity were applied as system responses to predict the over- flow cut size variations. These investigations showed that cut size would decrease by increasing diameter and height of the separation column and cone section depth, due to the decrease of turbulent intensity and fluid velocity. As the size of discharge gate increases, the overflow cut-size would decrease due to freely fluid stream out of the column. The overflow cut-size was significantly increased in downward fed classifier compared to that fed by upward fluid stream. In addition, reforming the shape of angular overflow outlet's weir into the curved form prevented stream inside returning and consequently unselec- tire cut-size decreasing. 展开更多
关键词 Hydraulic classifier Modeling Computational fluid dynamic Cut size
下载PDF
ASSERT:attack synthesis and separation with entropy redistribution towards predictive cyber defense 被引量:2
2
作者 Ahmet Okutan Shanchieh Jay Yang 《Cybersecurity》 CSCD 2019年第1期253-270,共18页
The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection,where different attack strategies can be analyzed and used to anticipate next malici... The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection,where different attack strategies can be analyzed and used to anticipate next malicious actions,especially the unusual ones.Unfortunately,traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical,given the scarcity of representative data and the evolving nature of cyberattacks.This paper describes the design and evaluation of a novel automated system,ASSERT,which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions.It takes streaming malicious event evidences as inputs,abstracts them to edge-based behavior aggregates,and associates the edges to attack models,where each represents a unique and collective attack behavior.It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present,and creates new attack models by maximizing a cluster validity index.ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents.It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed.Through the use of 2017 National Collegiate Penetration Testing Competition data,this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models. 展开更多
关键词 Cyber security dynamic bayesian classifier Clustering KL divergence
原文传递
ASSERT:attack synthesis and separation with entropy redistribution towards predictive cyber defense
3
作者 Ahmet Okutan Shanchieh Jay Yang 《Cybersecurity》 2018年第1期528-545,共18页
The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection,where different attack strategies can be analyzed and used to anticipate next malici... The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection,where different attack strategies can be analyzed and used to anticipate next malicious actions,especially the unusual ones.Unfortunately,traditional predictive analytics or machine learning techniques that require training data of known attack strategies are not practical,given the scarcity of representative data and the evolving nature of cyberattacks.This paper describes the design and evaluation of a novel automated system,ASSERT,which continuously synthesizes and separates cyberattack behavior models to enable better prediction of future actions.It takes streaming malicious event evidences as inputs,abstracts them to edge-based behavior aggregates,and associates the edges to attack models,where each represents a unique and collective attack behavior.It follows a dynamic Bayesian-based model generation approach to determine when a new attack behavior is present,and creates new attack models by maximizing a cluster validity index.ASSERT generates empirical attack models by separating evidences and use the generated models to predict unseen future incidents.It continuously evaluates the quality of the model separation and triggers a re-clustering process when needed.Through the use of 2017 National Collegiate Penetration Testing Competition data,this work demonstrates the effectiveness of ASSERT in terms of the quality of the generated empirical models and the predictability of future actions using the models. 展开更多
关键词 Cyber security dynamic bayesian classifier Clustering KL divergence
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部