The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing network damage assessment method fall short because they either lack correlation adjustment among indexes or without conclusive evidence to demonstrated the degree does represent the real situation of the network. This paper proposed a method to adjustment index correlation based on Orthogonalization. The advantages of this method for evaluation damage degree of network have been demonstrated...
Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large...
Today's networks are facing more and more serious large-scale network attack such as worm and botnet. While such attacks can't and shouldn't be reproduced in the real network, network simulation is become more and more popular during the research. As the prerequisite of network simulation, topology partition influences the performance of simulation significantly. We suggest a new topology partition...
At information service system, user could get useful information from service provider. In such a system, flexibility and reliability are required. However, such requirements can not be satisfied by conventional system due to centralized management and network congestion especially in ad hoc network which equipments of user and SP have limited electrical power and network transmitting ability. To...
Network-based and distributed intrusion detection system is aroused by the burst-outs of large-scale abnormal events. How to place detection instruments is the key to the detections. The paper turned the problem of detector placement to that of the clustering of topology graph. A novel bidirectional hierarchical clustering algorithm is put forward, which decreases the amount of result clusters by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.