1000 resultados para alimentary security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an innovative fusion-based multi-classifier e-mail classification on a ubiquitous multicore architecture. Many previous approaches used text-based single classifiers to identify spam messages from a large e-mail corpus with some amount of false positive tradeoffs. Researchers are trying to prevent false positive in their filtering methods, but so far none of the current research has claimed zero false positive results. In e-mail classification false positive can potentially cause serious problems for the user. In this paper, we use fusion-based multi-classifier classification technique in a multi-core framework. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our multi-classifier-based filtering system in terms of running time, false positive rate, and filtering accuracy. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at an average cost of 1.4 ms. We also reduced the instances of false positives, which are one of the key challenges in a spam filtering system, and increases e-mail classification accuracy substantially compared with single classification techniques.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Prime Minister Kevin Rudd has recently announced plans to develop greater regional integration and cooperation in the Asia-Pacific region.

Historically, Australian opinion, however, has expressed some anxiety about forging closer economic, political and security ties with Asia. Using trend data from the Australian Election Study and the Lowy Institute Poll, this article examines changes in Australian public opinion on closer engagement with Asia and whether the Australian public is likely to support the Rudd government’s push towards developing deeper regional diplomacy. The article finds a shift in opinion since the 1990s with a younger generation of voters who are moderately supportive of Australia’s engagement with Asia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information technology has become the core tool of business organisations’. External and internal threats as well as legal, regulatory and contractual compliance requirements are all combining to make effective information security a key information technology management challenges. This paper describes an undergraduate information technology security management course that provides comprehensive knowledge and skills necessary to manage both strategic and operational aspects of information security. The course covers a broad range of managerial topics in information technology security and makes use of a number of security tools and techniques to complement the theory taught. In this paper, we describe our approach, our experiences and lessons learned for teaching information technology security management course. The paper details the content of the course and outlines how it is taught and assessed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Armed separatist movements in Papua, East Timor and Aceh have been a serious problem for Indonesia's central government. This book examines the policies of successive Indonesian governments to contain secessionist forces, focusing in particular on Jakarta's response towards the armed separatist movement in Aceh. Unlike other studies of separatism in Indonesia, this book concentrates on the responses of the central government rather than looking only at the separatist forces. It shows how successive governments have tried a wide range of approaches, including military repression, offers of autonomy, peace talks and a combination of these. It discusses the lessons that have been learned from these different approaches and analyzes the impact of the tsunami, including the successful accommodation of former rebels within an Indonesian devolved state structure and the expanding implementation of Islamic law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines networks as a means of organising counter-terrorism in Australia and the conditions that promote the effectiveness of security networks. It presents a framework for analysing network dynamics and network effectiveness in this field that can assist researchers to better understand networks and practitioners to better manage networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Looking mainly at the changing nature of the U.S.-Japan security alliance since 11 September 2001, this thesis argues that the recent emergence of a more assertive Japanese security policy has led to a more robust Chinese response to perceived security challenges from Tokyo and Washington.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and improved codes of best practice to address current weak organizational security practices, this may not be sufficient in the current dynamic security environment. Organizational information security must adapt to changing conditions by extending security governance to middle management as well as system/network administrators. Unfortunately the lack of clear business security objectives and strategies at the business unit level is likely to result in a compliance culture, where those responsible for implementing information security are more interested in complying with organizational standards and policies than improving security itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many organizations still rely on deterrence to control insider threats and on purely preventive strategies to control outsider threats. Such a simple approach to organizational information security is no longer viable given the increasing operational sophistication of current security threat agents and the complexity of information technology infrastructure. Effective implementation of security requires organizations to select a combination of strategies that work in tandem and best suits their security situation. This paper addresses the identification and classification of factors that influence implementation of security strategies in organizations. In this paper, we develop a preliminary architecture that aims to assist organizations in deciding how strategies can be designed to complement each other to improve the cost-effectiveness of security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Provides an overview of current research by the author and related Australian scholars on the problem of vigilantism as a question of media representation, as opposed to a substantive crime prevention trend. Implications of this research discussed for a professional security audience.