Multimedia applications in smart electronic commerce (e-commerce), such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. This study addresses the problem of security in e-commerce and proposes a unified framework to analyze the security data. First, to allocate the definite security resources optimally, we build our e-commerce monitoring model as an undirected network, where a monitored node is a vertex of the graph and a connection between vertices is an undirected edge. Moreover, we aim to find a minimal cover for the monitoring network as the optimal solution of resource allocation, which is defined as the network monitoring minimization problem (NMM). This problem is proved to be NP-hard. Second, by analyzing the latent threats, we design a novel and trusted monitoring system that can integrate incident monitoring, data analysis, risk assessment, and security warnings. This system does not touch users’ privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics. Our experimental results on web scale data demonstrate that our system is flexible enough when monitoring, which also verify the effectiveness and efficiency of our system.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2ntZhfw
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2nRQGPr via IFTTT
-
<span class="paragraphSection"><div class="boxTitle">Abstract</div>In this contribution, which builds ...
-
Canons of Criticism. Contents: Introduction * Outline of the Canons * External Critical Rules * Internal Critical Rules * How to Use the Can...
-
The Vietnam War Learning Guide. The Vietnam War analysis by PhD students from Stanford, Harvard, Berkeley from #AlexandrosSfakianakis via ...
-
136 Unit 6 • Cause-Effect Essays What is a great topic for a cause-effect essay? This type of essay may focus more on the causes or more on ...
-
How is an essay structured? In order for your essay to be convincing and make sense, it needs to be presented inside a well structured piece...
-
Winners of the 13th Annual 2017 Info Security PG's Global Excellence Awards® from #AlexandrosSfakianakis via Alexandros G.Sfakianakis ...
-
Background: At present, there are limited data available regarding the use and feasibility of enhanced recovery pathways for patients underg...
-
Abstract Purpose of Review Transplant patients are at high risk for invasive pulmonary aspergillosis, and the associated mortality is hi...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου