The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an important part of DRM, key management technology has been widely used in protecting various copyrights, including industries such as digital television technologies. With the development of all kinds of technologies, the key management scheme has been developed and evolved within which the key distribution also has a variety of forms like unicast and multicast. In this paper, a key management...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Software defined networks provide new opportunities for automating the process of network debugging. Many tools have been developed to verify the correctness of network configurations on the control plane. However, due to software bugs and hardware faults of switches, the correctness of control plane may not readily translate into that of data plane. To bridge this gap, we present VeriDP, which can...
Vulnerability of industrial control network communication protocol is the most important reason leading to industrial control network attacks. In this paper, the vulnerability of DNP3, the typical industrial control network communication protocol, is analyzed. The abnormal behaviors of DNP3 are categorized according to the Snort detection mechanisms. The Snort detection rule template for anomaly DNP3...
Multipath transport is an important way to improve the transmission performance of Internet applications. This demo presents a multipath transport system based on application level relay (MPTS-AR), which defines three kinds of logical entity of user agent, controller and relay server. Controller and relay server collaboratively provide relay services, and user agent integrates the multipath transmission...
Driven by the rapid growth of large scale real-time data mining applications for personalized ads and content recommendations, distributed stream processing systems are widely applied in modern big-data architectures. Designs of existing stream computing systems are mostly focusing on the scalability and availability issues. Other important issues which are essential to the actual cost and productivity,...
This paper developes a design to Windows operating system for basic platform series, in multiple servers distributed network formed by the environment of the realization of the instant communication system. That is based on TCP/IP protocol, multiple clients, a load server, and more data servers constitute a distributed network. System information communication hub, connected to all the clients and...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
Nowadays, subjects of cloud computing, especially cloud storage, are still thought to be new fields with few teaching opportunities. This paper discusses how to realize GET/PUT requests between REST client and servers, utilize CDMI (Cloud Data Management Interface) standard to carry on teaching experiment of cloud storage communication under Linux environment. Practice proves that it is useful to...
Rural educational resource regional service platform is service-oriented, providing personalized service to users anywhere who participate in distance education. Users can acquire resources based on their interests, achieving to share educational resources in the maximum extent. The paper first briefly analyses the mode, the present situation and the characteristics of rural education, then puts forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.