期刊文献+
共找到67篇文章
< 1 2 4 >
每页显示 20 50 100
Insiders' Hedging for Jump Diffusion Processes with Applications to Index Tracking
1
作者 苏小囡 王伟 王文胜 《Journal of Donghua University(English Edition)》 EI CAS 2011年第6期571-575,共5页
The hedging problem for insiders is very important in the financial market.The locally risk minimizing hedging was adopted to solve this problem.Since the market was incomplete,the minimal martingale measure was chose... The hedging problem for insiders is very important in the financial market.The locally risk minimizing hedging was adopted to solve this problem.Since the market was incomplete,the minimal martingale measure was chosen as the equivalent martingale measure.By the F-S decomposition,the expression of the locally risk minimizing strategy was presented.Finally,the local risk minimization was applied to index tracking and its relationship with tracking error variance (TEV)-minimizing strategy was obtained. 展开更多
关键词 jump diffusion processes local risk minimization insiders hedging index tracking
下载PDF
The Influence of Differential Leadership on Employees’Affective Commitment:A Perspective of the Insiders and Outsiders
2
作者 Yunxia Su Minggui Sun 《Journal of Business Administration Research》 2020年第3期12-23,共12页
From the perspective of the insiders and outsiders,this study explores the influence of differential leadership on employees’affective commitment and the moderating effect of leader’s self-enhancing humor and indivi... From the perspective of the insiders and outsiders,this study explores the influence of differential leadership on employees’affective commitment and the moderating effect of leader’s self-enhancing humor and individual traditionality.The results show that the differential leadership has a positive impact on the organizational affective commitment of employees,the leader’s self-enhancing humor and the employees’traditionality play a positive regulatory role respectively.Moreover,compared with the outsiders,the low traditionality has a stronger influence on the relationship between differential leadership and organizational affective commitment of the insiders.This paper enriches the research on the influence of leadership style on employee’s affective commitment,proposes and verifies the moderation of leader’s self-enhancing humor and employee’s traditionality,which complements the boundary conditions for the effectiveness of differential leadership style. 展开更多
关键词 Differential leadership Affective commitment insiders OUTSIDERS Self-enhancing humor Traditionality
下载PDF
Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
3
作者 季琦 LI Wei +2 位作者 PAN Bailin XUE Hongkai QIU Xiang 《High Technology Letters》 EI CAS 2024年第2期199-210,共12页
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t... In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods. 展开更多
关键词 insider threat detection advanced persistent threats graph construction heterogeneous graph embedding
下载PDF
Editorial board publication strategy and acceptance rates in Turkish national journals
4
作者 Lokman Tutuncu 《Journal of Data and Information Science》 CSCD 2023年第4期49-83,共35页
Purpose: This study takes advantage of newly released journal metrics to investigate whether local journals with more qualified boards have lower acceptance rates, based on data from 219 Turkish national journals and ... Purpose: This study takes advantage of newly released journal metrics to investigate whether local journals with more qualified boards have lower acceptance rates, based on data from 219 Turkish national journals and 2,367 editorial board members.Design/methodology/approach: This study argues that journal editors can signal their scholarly quality by publishing in reputable journals. Conversely, editors publishing inside articles in affiliated national journals would send negative signals. The research predicts that high(low) quality editorial boards will conduct more(less) selective evaluation and their journals will have lower(higher) acceptance rates. Based on the publication strategy of editors, four measures of board quality are defined: Number of board inside publications per editor(INSIDER), number of board Social Sciences Citation Index publications per editor(SSCI), inside-to-SSCI article ratio(ISRA), and board citation per editor(CITATION). Predictions are tested by correlation and regression analysis.Findings: Low-quality board proxies(INSIDER, ISRA) are positively, and high-quality board proxies(SSCI, CITATION) are negatively associated with acceptance rates. Further, we find that receiving a larger number of submissions, greater women representation on boards, and Web of Science and Scopus(WOSS) coverage are associated with lower acceptance rates. Acceptance rates for journals range from 12% to 91%, with an average of 54% and a median of 53%. Law journals have significantly higher average acceptance rate(68%) than other journals, while WOSS journals have the lowest(43%). Findings indicate some of the highest acceptance rates in Social Sciences literature, including competitive Business and Economics journals that traditionally have low acceptance rates. Limitations: Research relies on local context to define publication strategy of editors. Findings may not be generalizable to mainstream journals and core science countries where emphasis on research quality is stronger and editorial selection is based on scientific merit.Practical implications: Results offer useful insights into editorial management of national journals and allow us to make sense of local editorial practices. The importance of scientific merit for selection to national journal editorial boards is particularly highlighted for sound editorial evaluation of submitted manuscripts.Originality/value: This is the first attempt to document a significant relation between acceptance rates and editorial board publication behavior. 展开更多
关键词 Board quality Editorial review Scientific productivity Local journals Insider bias Inside publication
下载PDF
Probability of informed trading during the COVID‑19 pandemic:the case of the Romanian stock market
5
作者 Cosmin Octavian Cepoi Victor Dragotă +1 位作者 Ruxandra Trifan Andreea Iordache 《Financial Innovation》 2023年第1期889-915,共27页
Using data from the Bucharest Stock Exchange,we examine the factors influencing the probability of informed trading(PIN)during February—October 2020,a COVID-19 pandemic period.Based on an unconditional quantile regre... Using data from the Bucharest Stock Exchange,we examine the factors influencing the probability of informed trading(PIN)during February—October 2020,a COVID-19 pandemic period.Based on an unconditional quantile regression approach,we show that PIN exhibit asymmetric dependency with liquidity and trading costs.Furthermore,building a customized database that contains all insider transactions on the Bucharest Stock Exchange,we reveal that these types of orders monotonically increase the infor-mation asymmetry from the 50th to the 90th quantile throughout the PIN distribution.Finally,we bring strong empirical evidence associating the level of information asym-metry to the level of fake news related to the COVID-19 pandemic.This novel result suggests that during episodes when the level of PIN is medium to high(between 15 and 50%),any COVID-19 related news classified as misinformation released during the lockdown period,is discouraging informed traders to place buy or sell orders condi-tioned by their private information. 展开更多
关键词 PIN COVID-19 Market microstructure Insider trading
下载PDF
Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification
6
作者 Dong-Wook Kim Gun-Yoon Shin Myung-Mook Han 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期153-164,共12页
Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many... Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many intrusion detection systems learn and prevent known scenarios,but because malicious behavior has similar patterns to normal behavior,in reality,these systems can be evaded.Furthermore,because insider threats share a feature space similar to normal behavior,identifying them by detecting anomalies has limitations.This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied to classify normal vs.malicious users.The discrete wavelet transformation technique easily discovers new patterns or decomposes synthesized data,making it possible to distinguish between shared characteristics.To verify the efficacy of the proposed methodology,experiments were conducted in which normal users and malicious users were classified based on insider threat scenarios provided in Carnegie Mellon University’s Computer Emergency Response Team(CERT)dataset.The experimental results indicate that the proposed methodology with discrete wavelet transformation reduced the false-positive rate by 82%to 98%compared to the case with no wavelet applied.Thus,the proposed methodology has high potential for application to similar feature spaces. 展开更多
关键词 Anomaly detection CYBERSECURITY discrete wavelet transformation insider threat classification
下载PDF
试论由英语语言教学项目实施人员参与的基线研究(英文)
7
作者 余才胜 《当代继续教育》 2000年第1期46-49,共4页
本文结合中英成人教育湖北英语培训中心的实践经验详细论述了在由外资资助的英语语言教学项目中所进行的一项重要调查研究工作—Insiders Baseline Study。本文在详细区分了In-siders和 Outside... 本文结合中英成人教育湖北英语培训中心的实践经验详细论述了在由外资资助的英语语言教学项目中所进行的一项重要调查研究工作—Insiders Baseline Study。本文在详细区分了In-siders和 Outsiders的含义的基础上,提出了由所有参与项目实施成员参加的Insiders Baseline Study,因为它不仅对项目的可行性和可持续性有着非常重要的意义,而且对项目中的课程设计和教师发展有着非常积极的作用。 展开更多
关键词 insiders OUTSIDERS insidersBaselineStudy 英语教学 课程设计 教师发展
下载PDF
中英成人英语项目基线研究的两个主要作用(英文)
8
作者 余才胜 《当代继续教育》 2000年第2期44-46,共3页
人们常认为英语语言教学项目中的基线研究仅仅是为了研究某个项目的可行性,却忽略其对师资培训课程设计和对参与项目实施的教师的发展所起的作用。本文结合中英成人教育湖北英语培训中心两年多的实践,论述由中英英语教学项目成员参与... 人们常认为英语语言教学项目中的基线研究仅仅是为了研究某个项目的可行性,却忽略其对师资培训课程设计和对参与项目实施的教师的发展所起的作用。本文结合中英成人教育湖北英语培训中心两年多的实践,论述由中英英语教学项目成员参与的基线研究为项目的可持续性发展提供课程设计与教师发展的必要依据。 展开更多
关键词 insiders BASELINE study COURSE design TEACHER DEVELOPMENT
下载PDF
Ten Issues on Beauty Brand Growth
9
作者 Mai Qing 《China Detergent & Cosmetics》 2019年第2期9-13,共5页
Background Not long ago, I shared my ideas with the insiders during a brand growth forum. At the time, not surprisingly, I received many questions that were often asked: Without financing nor big money, how can a bran... Background Not long ago, I shared my ideas with the insiders during a brand growth forum. At the time, not surprisingly, I received many questions that were often asked: Without financing nor big money, how can a brand grow rapidly? The repurchase is not bad, but it is not working to attract new customers. Can CRM grow only depending on the regular customer? A lot of brands put in hundreds of thousands of money on beauty influencers on internets every month. Why the conversion rate is so bad? My company?s scale is large, basically speaking, but the profit rate is not good. How to improve efficiency? I have no problem with growth, but inventory management is too difficult. It seems to make money. In fact, it is all in stock. How to enhance the uniqueness of my brand? If I?m unique enough, will my brand grow? 展开更多
关键词 BEAUTY BRAND GROWTH CRM insiders
下载PDF
证券市场全球化与内幕交易的法律管制 被引量:1
10
作者 陈海晖 林光金 《东南学术》 CSSCI 1997年第4期27-31,共5页
关键词 内幕交易 证券市场 市场全球化 内幕交易行为 内幕信息 证券交易法 证券公司 证券违法 法律管制 INSIDER
下载PDF
Challenge-based collaborative intrusion detection in software-defined networking: An evaluation 被引量:2
11
作者 Wenjuan Li Yu Wang +3 位作者 Zhiping Jin Keping Yu Jin Li Yang Xiang 《Digital Communications and Networks》 SCIE CSCD 2021年第2期257-263,共7页
Software-Defined Networking(SDN)is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications.It can help manage the whole network environment in a ... Software-Defined Networking(SDN)is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications.It can help manage the whole network environment in a consistent and holistic way,without the need of understanding the underlying network structure.At present,SDN may face many challenges like insider attacks,i.e.,the centralized control plane would be attacked by malicious underlying devices and switches.To protect the security of SDN,effective detection approaches are indispensable.In the literature,challenge-based collaborative intrusion detection networks(CIDNs)are an effective detection framework in identifying malicious nodes.It calculates the nodes'reputation and detects a malicious node by sending out a special message called a challenge.In this work,we devise a challenge-based CIDN in SDN and measure its performance against malicious internal nodes.Our results demonstrate that such a mechanism can be effective in SDN environments. 展开更多
关键词 Software-defined networking Trust management Collaborative intrusion detection Insider attack Challenge mechanism
下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:2
12
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective FORWARDING TRUST Mechanism MONITOR NODE Secure Routing Protocol
下载PDF
Ensemble Strategy for Insider Threat Detection from User Activity Logs
13
作者 Shihong Zou Huizhong Sun +1 位作者 Guosheng Xu Ruijie Quan 《Computers, Materials & Continua》 SCIE EI 2020年第11期1321-1334,共14页
In the information era,the core business and confidential information of enterprises/organizations is stored in information systems.However,certain malicious inside network users exist hidden inside the organization;t... In the information era,the core business and confidential information of enterprises/organizations is stored in information systems.However,certain malicious inside network users exist hidden inside the organization;these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company.The existing approaches on insider threat detection mostly focus on monitoring,detecting,and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security.To this end,to be able to detect insider threats more effectively,a data processing tool was developed to process the detected user activity to generate information-use events,and formulated a Data Adjustment(DA)strategy to adjust the weight of the minority and majority samples.Then,an efficient ensemble strategy was utilized,which applied the extreme gradient boosting(XGBoost)model combined with the DA strategy to detect anomalous behavior.The CERT dataset was used for an insider threat to evaluate our approach,which was a real-world dataset with artificially injected insider threat events.The results demonstrated that the proposed approach can effectively detect insider threats,with an accuracy rate of 99.51%and an average recall rate of 98.16%.Compared with other classifiers,the detection performance is improved by 8.76%. 展开更多
关键词 Insider threat data adjustment imbalanced data ensemble strategy
下载PDF
User Behavior Traffic Analysis Using a Simplified Memory-Prediction Framework
14
作者 Rahmat Budiarto Ahmad A.Alqarni +3 位作者 Mohammed YAlzahrani Muhammad Fermi Pasha Mohamed FazilMohamed Firdhous Deris Stiawan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2679-2698,共20页
As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents cause... As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning. 展开更多
关键词 Machine learning memory prediction framework insider attacks user behavior analytics
下载PDF
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
15
作者 A.S.Anakath R.Kannadasan +2 位作者 Niju P.Joseph P.Boominathan G.R.Sreekanth 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期479-492,共14页
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase ... Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently.This cloud is nowadays highly affected by internal threats of the user.Sensitive applications such as banking,hospital,and business are more likely affected by real user threats.An intruder is presented as a user and set as a member of the network.After becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or conversation.The major issue in today's technological development is identifying the insider threat in the cloud network.When data are lost,compromising cloud users is difficult.Privacy and security are not ensured,and then,the usage of the cloud is not trusted.Several solutions are available for the external security of the cloud network.However,insider or internal threats need to be addressed.In this research work,we focus on a solution for identifying an insider attack using the artificial intelligence technique.An insider attack is possible by using nodes of weak users’systems.They will log in using a weak user id,connect to a network,and pretend to be a trusted node.Then,they can easily attack and hack information as an insider,and identifying them is very difficult.These types of attacks need intelligent solutions.A machine learning approach is widely used for security issues.To date,the existing lags can classify the attackers accurately.This information hijacking process is very absurd,which motivates young researchers to provide a solution for internal threats.In our proposed work,we track the attackers using a user interaction behavior pattern and deep learning technique.The usage of mouse movements and clicks and keystrokes of the real user is stored in a database.The deep belief neural network is designed using a restricted Boltzmann machine(RBM)so that the layer of RBM communicates with the previous and subsequent layers.The result is evaluated using a Cooja simulator based on the cloud environment.The accuracy and F-measure are highly improved compared with when using the existing long short-term memory and support vector machine. 展开更多
关键词 Cloud computing security insider attack network security PRIVACY user interaction behavior deep belief neural network
下载PDF
Internal Transactions for Multiple Risky Assets
16
作者 Qiong Zhang Shuang Chen 《Open Journal of Statistics》 2019年第1期85-99,共15页
Most of the articles about insider trading assume that there is only one risky asset in the market. On the basis of these papers, this thesis is mainly divided into three parts to study the situation of multiple risky... Most of the articles about insider trading assume that there is only one risky asset in the market. On the basis of these papers, this thesis is mainly divided into three parts to study the situation of multiple risky assets in the market. In the first part, the situation of multiple risky assets in the market when two transactions are in progress is studied and then, the equilibrium when the market requires the internal traders to disclose the trading volume after each transaction is analyzed. In the second part, the equilibrium of multi-period based on the two phases of transaction is derived. The third part is the summary of the paper. 展开更多
关键词 INSIDER TRADING MULTIPLE Risky ASSETS MULTI-PERIOD Noise TRADER
下载PDF
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
17
作者 Rita M. Barrios 《Journal of Information Security》 2013年第1期54-65,共12页
When considering Intrusion Detection and the Insider Threat, most researchers tend to focus on the network architecture rather than the database which is the primary target of data theft. It is understood that the net... When considering Intrusion Detection and the Insider Threat, most researchers tend to focus on the network architecture rather than the database which is the primary target of data theft. It is understood that the network level is adequate for many intrusions where entry into the system is being sought however it is grossly inadequate when considering the database and the authorized insider. Recent writings suggest that there have been many attempts to address the insider threat phenomena in regards to database technologies by the utilization of detection methodologies, policy management systems and behavior analysis methods however, there appears to be a lacking in the development of adequate solutions that will achieve the level of detection that is required. While it is true that Authorization is the cornerstone to the security of the database implementation, authorization alone is not enough to prevent the authorized entity from initiating malicious activities in regards to the data stored within the database. Behavior of the authorized entity must also be considered along with current data access control policies. Each of the previously mentioned approaches to intrusion detection at the database level has been considered individually, however, there has been limited research in producing a multileveled approach to achieve a robust solution. The research presented outlines the development of a detection framework by introducing a process that is to be implemented in conjunction with information requests. By utilizing this approach, an effective and robust methodology has been achieved that can be used to determine the probability of an intrusion by the authorized entity, which ultimately address the insider threat phenomena at its most basic level. 展开更多
关键词 BAYESIAN BELIEF Network Database INSIDER THREAT INTRUSION Detection
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
18
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber Security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis Statistical LEARNING Transduction
下载PDF
Evaluation of Hypervisor Stability towards Insider Attacks
19
作者 Roman Kulikov Svetlana Kolesnikova 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期37-42,共6页
Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are... Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture. 展开更多
关键词 Cloud computing hypervisor insider attack hypervisor stability virtualization virtual machine
下载PDF
九三年度最新外来语(二)
20
作者 谷玲怡 《东北亚外语研究》 1994年第2期14-17,共4页
[equal partner]/平等合作。指站在平等的立场上,互相协作。
关键词 PARTNER 九三 消息灵通 INSTRUCTION INSIDER eleven 证券交易 导入法 HEDGE 内部情报
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部