Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c...Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).展开更多
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th...The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).展开更多
We introduce a phase-only hologram generation method based on an integral imaging, and propose an enhancement method in representable depth interval. The computational integral imaging reconstruction method is modifie...We introduce a phase-only hologram generation method based on an integral imaging, and propose an enhancement method in representable depth interval. The computational integral imaging reconstruction method is modified based on optical flow to obtain depth-slice images for the focused objects only. A phaseonly hologram for' multiple plane images is generated using the iterative Fresnel transform algorithm. In addition, a division method in hologram plane is proposed for enhancement in the representable minimum depth interval.展开更多
Based on 294 earthquake sequences with magnitude greater than or equal to 5.0 occurred in Chinese mainland since 1970, the spatial distribution features of sequence types have been studied. In southwestern China, it t...Based on 294 earthquake sequences with magnitude greater than or equal to 5.0 occurred in Chinese mainland since 1970, the spatial distribution features of sequence types have been studied. In southwestern China, it takes mainshock-aftershock sequence type (MAT) as the major in Chuan-Dian rhombic block and concerned Xianshuihe-Anninghe-Xiaojiang seismic belt, as well as in Jinshajiang-Honghe seismic belt. Multiple mainshock type (MMT) mainly distributes in western Yunnan, and Longlin and Lancang areas in Tengchong-Baoshan block in west of Nujiang-Lancangjiang fault zone. A few isolated earthquake type (IET) mainly occurred in northwestern Sichuan and there is no IET occurred in Yunnan region. In northwestern China, it takes mainshock-aftershock sequence type (MAT) as the major in west segment of South Tianshan in Xinjiang region. Some MMT also occurred in this area in the intersection of Kalpin block and the Puchang fault zone. It takes IET as the major in middle Tianshan in Xinjiang. Along the Qilianshan seismic belt, most of sequences are MAT. In Qinghai region, it takes MAT as the major, but the regional feature of the spatial distribution of sequence types is not very clear. In North China, it takes MAT as the major in Yinshan-Yanshan-Bohai seismic belt, north edge of North China, and in Hebei plain seismic belt, as well as in sub-plate of lower river area of Yangtze River. In intersection of north segment of Shanxi seismic belt and the NW-trending Yinshan-Yanshan-Bohai seismic belt, there are several moderate or strong MMT with magnitude from 5.0 to 6.0 occurred. In south of North China around the latitude line of 35°N, it takes IET as the major. The spatial distribution of sequence types is relevant to the patterns of tectonic movements. MAT is mostly produced by the ruptures of locked units or asperities or the neonatal separating segments inside the fault zones. MMT is generally relevant to the conjugate structures or intersection of many tectonic settings. Further extension of simple fault often produces IET. Spatial distribution of sequence types is also correlative to the regional and deep environment of crustal medium to some extent. MAT mainly distributes in high velocity area in upper crust or in the transition zone between high velocity area and low velocity area, MMT mostly occurred in the low velocity area in upper crust.展开更多
文摘Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).
文摘The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).
基金supported by the Brain Korea 21 Program (Information Technology of Seoul National University)
文摘We introduce a phase-only hologram generation method based on an integral imaging, and propose an enhancement method in representable depth interval. The computational integral imaging reconstruction method is modified based on optical flow to obtain depth-slice images for the focused objects only. A phaseonly hologram for' multiple plane images is generated using the iterative Fresnel transform algorithm. In addition, a division method in hologram plane is proposed for enhancement in the representable minimum depth interval.
基金Joint Seismological Science Foundation of China (105076) and continued subject ″Statistic Features of Aftershock Sequences and Forecast of the Large Aftershocks″ (2004BA601B01-04-02), Ministry of Science and Technology of China in the 10th Five-Year Plan.
文摘Based on 294 earthquake sequences with magnitude greater than or equal to 5.0 occurred in Chinese mainland since 1970, the spatial distribution features of sequence types have been studied. In southwestern China, it takes mainshock-aftershock sequence type (MAT) as the major in Chuan-Dian rhombic block and concerned Xianshuihe-Anninghe-Xiaojiang seismic belt, as well as in Jinshajiang-Honghe seismic belt. Multiple mainshock type (MMT) mainly distributes in western Yunnan, and Longlin and Lancang areas in Tengchong-Baoshan block in west of Nujiang-Lancangjiang fault zone. A few isolated earthquake type (IET) mainly occurred in northwestern Sichuan and there is no IET occurred in Yunnan region. In northwestern China, it takes mainshock-aftershock sequence type (MAT) as the major in west segment of South Tianshan in Xinjiang region. Some MMT also occurred in this area in the intersection of Kalpin block and the Puchang fault zone. It takes IET as the major in middle Tianshan in Xinjiang. Along the Qilianshan seismic belt, most of sequences are MAT. In Qinghai region, it takes MAT as the major, but the regional feature of the spatial distribution of sequence types is not very clear. In North China, it takes MAT as the major in Yinshan-Yanshan-Bohai seismic belt, north edge of North China, and in Hebei plain seismic belt, as well as in sub-plate of lower river area of Yangtze River. In intersection of north segment of Shanxi seismic belt and the NW-trending Yinshan-Yanshan-Bohai seismic belt, there are several moderate or strong MMT with magnitude from 5.0 to 6.0 occurred. In south of North China around the latitude line of 35°N, it takes IET as the major. The spatial distribution of sequence types is relevant to the patterns of tectonic movements. MAT is mostly produced by the ruptures of locked units or asperities or the neonatal separating segments inside the fault zones. MMT is generally relevant to the conjugate structures or intersection of many tectonic settings. Further extension of simple fault often produces IET. Spatial distribution of sequence types is also correlative to the regional and deep environment of crustal medium to some extent. MAT mainly distributes in high velocity area in upper crust or in the transition zone between high velocity area and low velocity area, MMT mostly occurred in the low velocity area in upper crust.