The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study utilizes the open source testing tool, Hping3, and the network analysis tool, Scapy, to simulate DDoS flood, reflection, and amplification attacks. We used the data generated from the attacks with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments...
In this paper, A test bench system used in the test of UAV is put forward. The system is consisted of four parts which includes bearing part of UAV, ground support position, transmission mechanism and measuring weight parts. Bearing part of UAV is used for placing the object to be measured which is connected to one end of the drive mechanism through the connecting shaft, The other end of the drive...
Probabilistic forwarding methods have been exploited in opportunistic networks to reduce the overhead of epidemic routing. However, most existing methods make all the nodes forward messages with the same probability (i.e., equal scheme), which causes the energy unbalance of nodes. To guarantee the energy balance of nodes and prolong the network lifetime, we design a differentiated scheme, i.e., different...
Most of simulation is based on ideal situation, but the real logistics system is complex and variable. Multi-resolution modeling can meet needs of different environments on the simulation, and adapt to the diversity, from different angles and aspects of simulation modeling. Based on the research of MRM, the method of aggregation and disaggregation is analyzed, the paradigm of aggregation and disaggregation...
Due to the features of unconventional emergency itself, “Scenario-Response” is regarded as a more effective emergency management mode to unconventional emergency. The whole process of disposal assessment is an important basis for relief decision. This paper describes the scenario-based assessment of whole unconventional emergencies disposal process (pre-disposal, the medium-term disposal, post-disposal),...
Vulnerability discovery is base technology in information system development, product testing and counterinformation. At present, vulnerability discovery already has been turned into the hot spot of the global security researches. There are so many kinds of vulnerability discovery methods. Many vulnerabilities has been found each year. But the frame work of the vulnerability discovery is out of the...
A test-bed has been set up in this paper to help analysis the self aligning device of pinion which can have a flexible rotation angle and thereby relieve the problem of bias load of last stage in heavy load and low speed transmission. Through this test-bed, running state of the device is studied and its dynamic characteristic is ensured and evaluated. This study lays foundations for dynamic analysis...
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In contrast, this paper studies the problem of exposure-path prevention for the region coverage in directional sensor networks. Because the exposure paths are prevented as long as no moving...
The research work of basic role-based access control RBAC is greatly emphasized in recent years. However, many of present works have nothing to do with the time character. After detail analysis about the RBAC 2004 model, a new RBAC model with multi-granularity time character called MG-TRBAC is proposed. In our new access control model, user, object, permission and roles are all temporal sensitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.