The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and...The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.展开更多
We have proposed a methodology to assess the robustness of underground tunnels against potential failure.This involves developing vulnerability functions for various qualities of rock mass and static loading intensiti...We have proposed a methodology to assess the robustness of underground tunnels against potential failure.This involves developing vulnerability functions for various qualities of rock mass and static loading intensities.To account for these variations,we utilized a Monte Carlo Simulation(MCS)technique coupled with the finite difference code FLAC^(3D),to conduct two thousand seven hundred numerical simulations of a horseshoe tunnel located within a rock mass with different geological strength index system(GSIs)and subjected to different states of static loading.To quantify the severity of damage within the rock mass,we selected one stress-based(brittle shear ratio(BSR))and one strain-based failure criterion(plastic damage index(PDI)).Based on these criteria,we then developed fragility curves.Additionally,we used mathematical approximation techniques to produce vulnerability functions that relate the probabilities of various damage states to loading intensities for different quality classes of blocky rock mass.The results indicated that the fragility curves we obtained could accurately depict the evolution of the inner and outer shell damage around the tunnel.Therefore,we have provided engineers with a tool that can predict levels of damages associated with different failure mechanisms based on variations in rock mass quality and in situ stress state.Our method is a numerically developed,multi-variate approach that can aid engineers in making informed decisions about the robustness of underground tunnels.展开更多
While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity...While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity of Support Vector Machines(SVMs),we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper.The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier.Specially,we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers.Utilizing this vulnerability function,we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack.Our defense method is verified to be very effective on the benchmark datasets,and the SVM classifier becomes more robust after using our kernel optimization scheme.展开更多
In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particula...In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.展开更多
文摘The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.
基金funding received by a grant from the Natural Sciences and Engineering Research Council of Canada(NSERC)(Grant No.CRDPJ 469057e14).
文摘We have proposed a methodology to assess the robustness of underground tunnels against potential failure.This involves developing vulnerability functions for various qualities of rock mass and static loading intensities.To account for these variations,we utilized a Monte Carlo Simulation(MCS)technique coupled with the finite difference code FLAC^(3D),to conduct two thousand seven hundred numerical simulations of a horseshoe tunnel located within a rock mass with different geological strength index system(GSIs)and subjected to different states of static loading.To quantify the severity of damage within the rock mass,we selected one stress-based(brittle shear ratio(BSR))and one strain-based failure criterion(plastic damage index(PDI)).Based on these criteria,we then developed fragility curves.Additionally,we used mathematical approximation techniques to produce vulnerability functions that relate the probabilities of various damage states to loading intensities for different quality classes of blocky rock mass.The results indicated that the fragility curves we obtained could accurately depict the evolution of the inner and outer shell damage around the tunnel.Therefore,we have provided engineers with a tool that can predict levels of damages associated with different failure mechanisms based on variations in rock mass quality and in situ stress state.Our method is a numerically developed,multi-variate approach that can aid engineers in making informed decisions about the robustness of underground tunnels.
基金supported by the National Natural Science Foundation of China under Grant No.61966011.
文摘While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity of Support Vector Machines(SVMs),we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper.The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier.Specially,we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers.Utilizing this vulnerability function,we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack.Our defense method is verified to be very effective on the benchmark datasets,and the SVM classifier becomes more robust after using our kernel optimization scheme.
基金supported by the Program for New Century Excellent Talents in University of China (NCET-06-0510)the National Natural Science Foundation of China (60874091)+1 种基金the Six Projects Sponsoring Talent Summits of Jiangsu Province (SJ209006)the Scientific Innovation Program for University Research Students in Jiangsu Province of China (CX08B_081Z)
文摘In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.