The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the physical-layer security, which exploits the channel characteristics in order to hide information from unauthorized receivers and does not reliance on the upper-layer encryption, has been proposed as a promising complement to the traditional security schemes. In this paper, the lower bounds on secrecy capacity for indoor visible light communications (VLC) are investigated. The noise is...
Phylogeny model inference plays an important role in malware forensics. It aims at revealing the evolutionary relationship among malware instances. It is expected to be helpful for uncovering the trends of malware evolution and establishing a principled naming scheme. Although tree-based models are the mainstream direction, they are not suited to represent the reticulation events which are occasionally...
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances,...
Wireless sensor networks (WSNs) which powered by batteries are widely used in military, healthcare, and scientific environments. One important challenge for setting WSN is the energy problem. Power management is one of efficient solutions for such problem and must be taken into account at all levels of the WSN. However, the power management may be out of action when the WSN suffers malicious attacks...
Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big...
Differential Chaos Shift Keying (DCSK) employs noncoherent demodulation technology and it's unnecessary for the receiver to generate synchronous chaotic signals at the receiving end. The structure of DCSK is simple and has good anti-noise performance. However, the security performance of DCSK is not enough, and it is easier to be cracked. For the above problems, a novel QAM-DCSK system was proposed...
This paper deals with the portfolio selection problem when the expected return rates and risks are fuzzy. Firstly, assuming the transaction cost being taken as V-shaped function, a fuzzy linear portfolio model is established based on the hypothesis that the correlation coefficients of different stock return rates are the same. Then, the fuzzy linear programming problem is transformed into a multi-objective...
This paper carries out research on vulnerability association problem in the complicated network and proposes the concept of "multi-node" vulnerability. By applying graph theory and case template to represent the "multi-node" vulnerability and reason the attack path, this paper describes how to reason the propagation path of the "multi-node" vulnerability and asses the...
In this paper, we analyze the security of a parallel keyed hash function based on chaotic neural network proposed by Xiao et al. recently. Weak keys and forgery attacks against Xiao et al.’s scheme are demonstrated. Both theoretical analysis and experimental results show that the parallel keyed hash function is not security. Besides, some improvement measures are presented to enhance the security...
Node identification is one of the most important issues to wireless sensor network security. Current approaches use cryptographic authentication and certification tools to ensure the node identification, while this paper introduces an intuitive method to identify a node by measuring its clock skew. This method is based on our observation that every sensor node has a unique clock skew value that is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.