2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
GABP Neural Network Algorithm Applied in Evaluation of Computer Network Security
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.12 2016.12 pp.377-388
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, in order to assess the risk of network, network security assessment process being involved in the content in detail. The above-mentioned research-based support system platform security test and evaluate research of the safety situation assessment. Prediction subsystem detailed design and carry out the implementation. In this paper, network security issues, as a detailed study of neural networks knowledge. Focus on the evaluation methods and calculation rules of nerve network technology, it has been studied by specific examples. Calculation demonstrated the feasibility of neural network evaluation model through actual case, which pointed out the traditional methods. This paper focuses on the network security assessment based on neural network technology, extensive analysis of the proposed major modeling tool indicator system for network security analysis. The application of neural networks was a network security assessment and to optimize the network by genetic algorithm. The key parameter combination operated efficiency of neural networks to get better play.
A Multi Dimension Service Trust Model in Social Network
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.12 2016.12 pp.389-398
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Trust is the precondition to provide users with efficient services in social network. We often use the evaluation information of other users, but doesn’t use social network by the trust relationship. In this study, by using the trust network theory to obtain the evaluation reliability of user’s feedback on the service, obtaining transaction context information through the transaction background, a comprehensive service trust computation model is put forward. It incorporates self-feedback, trust network neighbor feedback, feedback similarity and transaction context information. It can avoid the sparsity and cold start in traditional trust computation. The experimental results show that the model can effectively prevent social network dishonest feedback, and more accurate to reflect the service trust.
A Secure Ownership Transfer Protocol Supporting Face to Face Transactions for RFID Tag
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.12 2016.12 pp.399-408
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
RFID tag will experience multiple owners in its lifetime. Tag ownership transfer protocol is a hot research issue. It was proposed a secure tag ownership transfer protocol which supports face to face transactions. In this protocol, it uses two keys. One is used to authenticate entity; the other is used to implement tag ownership transfer. We analyzed the protocol security by using GNY logic. The result indicates that old owner authenticates the tag. The new owner and tag share a new key with the help of TTP. Moreover, the protocol resists replay attack, man-in-the-middle attack, desynchronization attack and tracking attack. It provides forward security and backward security about the tag information.
The Impacts of Smartphone Addiction and Technostress on Customer Satisfaction and Loyalty
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.12 2016.12 pp.409-418
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As most people use smartphones most of the time, smartphone addiction and technostress are likely to be easily induced. It can be expected that excessive smartphone addiction and technostress will have negative effects on customer satisfaction and loyalty. This study explores the effects of flow and social interaction anxiety on smartphone addiction, and investigates the relationships between addiction, technostress, customer satisfaction and loyalty. A total of 342 valid questionnaires were collected from university students who live in Gyeongnam province in South Korea. Eight hypotheses were examined using SmartPLS software. The findings indicated that flow and social interaction anxiety have positive impacts on smartphone addiction. Smartphone addiction has positive impacts on technostress and customer loyalty but does not affect customer satisfaction. Technostress has a negative effect on customer satisfaction but does not affect customer loyalty. Customer satisfaction is strongly associated with customer loyalty. The implications of these results are discussed and directions for future research are offered.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.