Search results

1 – 10 of 58
Per page
102050
Citations:
Loading...
Available. Content available
Article
Publication date: 1 April 1998

R.C. Papademetriou

392

Abstract

Details

Kybernetes, vol. 27 no. 3
Type: Research Article
ISSN: 0368-492X

Access Restricted. View access options
Article
Publication date: 1 April 1998

Rallis C. Papademetriou

This paper presents an overview of three information‐theoretic methods, which have been used extensively in many areas such as signal/image processing, pattern recognition and…

757

Abstract

This paper presents an overview of three information‐theoretic methods, which have been used extensively in many areas such as signal/image processing, pattern recognition and statistical inference. These are: the maximum entropy (ME), minimum cross‐entropy (MCE) and mutual information (MI) methods. The development history of these techniques is reviewed, their essential philosophy is explained, and typical applications, supported by simulation results, are discussed.

Details

Kybernetes, vol. 27 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Available. Content available
Article
Publication date: 1 April 1998

B.H. Rudall

206

Abstract

Details

Kybernetes, vol. 27 no. 3
Type: Research Article
ISSN: 0368-492X

Access Restricted. View access options
Article
Publication date: 16 August 2023

Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…

213

Abstract

Purpose

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.

Design/methodology/approach

Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.

Findings

The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.

Originality/value

A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1987

RALLIS C. PAPADEMETRIOU, THOMAS J. KETSEOGLOU and NICOLAOS S. TZANNES

Multiple Information Principle (MIP) is reviewed as a method of assigning a prior probability mass of density function to a random variable in the presence of some prior…

64

Abstract

Multiple Information Principle (MIP) is reviewed as a method of assigning a prior probability mass of density function to a random variable in the presence of some prior information. It is compared to the Maximum Information (MI) method and shown to be more general and inclusive of prior data available to the investigator. The image restoration problem is outlined as an inverse source problem with insufficient data for yielding a unique solution.

Details

Kybernetes, vol. 16 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Book part
Publication date: 16 March 2023

Kurt April, Babar Dharani and Amanda April

Abstract

Details

Lived Experiences of Exclusion in the Workplace: Psychological & Behavioural Effects
Type: Book
ISBN: 978-1-80043-309-0

Available. Content available
Book part
Publication date: 2 November 2017

Abstract

Details

Making Critical Sense of Immigrant Experience
Type: Book
ISBN: 978-1-78743-662-6

Available. Content available
Book part
Publication date: 26 October 2018

Jacqueline Stevenson and Sally Baker

Abstract

Details

Refugees in Higher Education
Type: Book
ISBN: 978-1-78743-714-2

Access Restricted. View access options
Article
Publication date: 1 February 1991

Rallis C. Papademetriou

The possibility of improving the quality of the minimum relative entropy spectral estimates by properly selecting the set of autocorrelation values is demonstrated. The study…

40

Abstract

The possibility of improving the quality of the minimum relative entropy spectral estimates by properly selecting the set of autocorrelation values is demonstrated. The study concentrates on two aspects: resolvability and accuracy of peak location. Several numerical examples are given.

Details

Kybernetes, vol. 20 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Available. Content available
Book part
Publication date: 30 May 2024

Jacqueline Stevenson and Sally Baker

Free Access. Free Access

Abstract

Details

Refugees in Higher Education
Type: Book
ISBN: 978-1-83797-975-2

1 – 10 of 58
Per page
102050