The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnets have started using Information obfuscation techniques include encryption to evade detection. In order to detect encrypted botnet traffic, in this paper we see detection of encrypted botnet traffic from normal network traffic as traffic classification problem. After analyses features of encrypted botnet traffic, we propose a novel meta-level classification algorithm based on content features...
Monitoring data of recent years from Symantec Company shows Botnet is becoming the base of all network crime. As P2P is being more widely used these days, some new Bots use P2P protocols to construct command and control system. This paper introduces Botnet detection methods, studies detection mechanism towards P2P Botnets based on user behavior, and proposes a new case to identify P2P Botnet. To test...
The sensitivity of sensitive equipment to voltage sags depends on the characteristics of voltage sag on the power supply site and the voltage tolerance of equipment. It is multi-uncertain including stochastic and fuzzy. Cloud model is used to present the sensitivity of equipment in this paper. The direct normal cloud generator was used to translate the qualitative distribution of VTC into quantitative...
There is complex uncertainty involved in evaluation of equipment sensitivity to voltage sags, and that makes it difficult for the point-valued assessment method to evaluate the impact of voltage sags on the sensitive equipment, especially in the case of small sample size. Considering the multi-valued nature of equipment status during the voltage sags, the voltage tolerance level of sensitive equipment...
This paper proposes a cheat-detection method based on Fuzzy Synthesis Decision for aimbot cheating in MMOG. Firstly, the decision set and the factor set that affect the cheating are determined. The factors weight vector which distinguishes the impact of different factors on the cheating is determined by Information Entropy. The membership function for each factor is given according to the factor feature,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.