The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increase of the number of college graduates, the country needs to do much in promoting their employment. Meanwhile as the rapid development of Internet lead to explosive growth of information, the real value needs to be effectively and immediately selected to benefit both employers and employees. This paper aims to propose two content based algorithms, one starting with cold boot and the...
Botnets are one of the most serious threats in the Internet, and thus the effective detection of the botnet becomes more and more important. In this paper, inspired by IP tracing technology, we propose a novel botnet detection method that can analyze the data packets, based on graph structure clustering. This method analyzes the comprehensive information of packages content and timestamp flow. Such...
With the technology of "Internet plus" gradually penetrating the energy industry, the fusion of smart grid and other energy network is now forming, which will create a new generation of high-efficiently energy utilization system called energy internet. And its complex coupling between energy flow and information flow is being to a cyber-physical system that possesses new features, i.e.,...
Ethnic cultural industry is the important engine of promoting regional economic development. Due to limited consumption ability in the local market, the most potential consumers of ethnic cultural products and services are mainly from economic developed areas. Therefore, how to improve its industrial influence forces and market scale through Internet has been the key development strategy. However,...
Cyber-Physical System (CPS, shortly) is a fusion systems of computing and physical processes. It is a highly integration of computation, communication and control in the framework of networked embedded system. In this paper, we analyze the concept and feature of CPS and propose a graphical hierarchical architecture for CPS. It is a graphic network structure within the same layer and a hierarchical...
Much prior work has demonstrated that the underlying network topology of communication networks is highly relevant to the intended communication performance of the networks. For reliable and efficient traffic transmission, the traffic load distribution in the network should be uniform and the average data transmission distance should be short. In this paper, we aim to find the optimal network topology...
In this paper, we study the effect of traffic generation patterns on traffic performance of complex networks. We consider a generic type of networks consisting of two kinds of nodes: hosts and routers. In this kind of network, the traffic performance is closely related to the traffic generation pattern which is determined by the hosts' locations. We evaluate the performance of six kinds of methods...
Due to the increasing network risk of large-scale disaster, it is important to protect failed requests for network operators. For the disaster survivable problem in an elastic optical datacenter networks with a bandwidth constraint, we formulate an integer linear program (ILP) for shared protection model. The algorithm utilizes the priori method to maximize the network throughput firstly, and then...
Many of today's devices are internet-enabled with IPv4 internet addresses, exposing them to internet threats. To determine the true scale of vulnerabilities being introduced, particularly in the IPv4 internet address space, a new methodology of scanning the entire IPv4 internet space is required. To improve scanning speeds we created a framework combining fast connectionless port scanners with a thorough...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to be a major factor. In this study we use cluster analysis coupled with an elaborate controlled experiment involving hundreds of participants to identify and examine high susceptibility user segments in terms of their perceptions, demographics, and phishing website traversal behavior. The results reveal three...
The purpose of this paper is to discuss how using Gephi to visualize the open ports at IP addresses in Shodan may provide a means of identifying SCADA devices. Visualizations were created using both IP addresses and open ports as nodes. Modularity, centralities, and layout were used to enhance the visualizations. From these visualizations we hope to gather a better understanding of what devices are...
Collaborative filtering recommendation has very important applications in the personalized recommendation. Especially it is widely used in e-commerce. The key of this approach is to find similar users or items using user-item rating matrix so that the system can show recommendations and provide a lot similar or interesting advice for users. The method of internet public opinion trend prediction based...
People are used to getting served by using mobileapplications. Applications for taxi calling such as Uber andDidi are in a dominant position. Along with employing thesesoftwares, personal information may leak while being transferredor preserved on the internet. Consider that a user's information preserved on the internet is obtained by an malicious adversary then he may further speculate user's privacy...
Nowadays, online social network has become one of the main tools which people communicate with each other every day. The online users' behavior is a large amount of high dimension data. However, is online and offline behavior the mapping relation? This paper explores whether there is consistency between online and offline behavior using the Alternating Direction Method of Multipliers (ADMM) algorithm...
Traditional machine learning traffic identification techniques usually use the features of a whole Internet flow, which makes such techniques few sense in engineering practices. Therefore, recent years, an increasing number of researchers turn to build effective machine learning models to identify traffics with the few packets at the early stage. In this paper, data gravitation based classification...
In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field...
In modern networks, there exist different applications which generate various different types of network traffic. In order to improve the performance of network management, it is important to identify and classify the internet traffic. The machine learning (ML) technique based on per-flow statistics has been widely used in traffic classification. Different from traditional classification methods,...
In this paper, a watermark scheme for detecting and recovering the tampering of speech signal is proposed. We embed an approximate version of the origin information into the less significant bits (LSBs). When the watermarked signal is tampered, we can localize the tampered area and exclude from the area, recovery the original one from the approximate version. Based the embedded information, we estimate...
Named data networking (NDN) shifts today's host-centric Internet architecture to a new data-centric network architecture. This well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN allows routers to cache named content, leading to a significant improvement of content retrieval which, however, opens a door for many new attacks. In this work, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.