The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN), which decouples the control plane from traditionally proprietary network devices, is highly flexible and suitable for flow management. However, if the policy depends on the results of network security analysis, the controller will perform complicated packet processing such as packet reassembly and protocol analysis. Such processing will easily overburden the controller,...
Stack buffer overflow is a serious security threat to program execution. A malicious attacker may overwrite the return address of a procedure to alter its control flow and hence change its functionality. While a number of hardware and/or software based protection schemes have been developed, these counter-measures introduce sizable overhead in performance and energy, thus limiting their applicability...
Outsourcing of the various aspects of IC design and fabrication flow strongly questions the classic assumption that “hardware is trustworthy”. Multiprocessor System-on-Chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores that may be untrustworthy. The complexity of...
Equipment characteristics of civil-military integration precision support are introduced, and the preliminary conception of the domestic Civil-military integration precision support system is put forward. Equipment of Civil-military integration is supported by the support system which has precise construction idea and process of the construction, and the key technologies are discussed and analyzed.
Many bugs, even those that are known and documented in bug reports, remain in mature software for a long time due to the lack of the development resources to fix them. We propose a general approach, R2Fix, to automatically generate bug-fixing patches from free-form bug reports. R2Fix combines past fix patterns, machine learning techniques, and semantic patch generation techniques to fix bugs automatically...
Security is very important in modern life due to most information is now stored in digital format. A good security mechanism will keep information secrecy and integrity, hence, plays an important role in modern information exchange. However, cryptography algorithms are extremely expensive in terms of execution time. To make data not easily being cracked, many arithmetic and logical operations will...
Attack graph plays an important role in network security, as it directly shows the existence of vulnerabilities in network and how attackers use these vulnerabilities to implement an effective attack, the analysis on the attack graph or the simulation of dynamic attacks through attack graph can help us easily find out the vulnerabilities in network, and take corresponding security measures, in order...
An access control model based on credibility is proposed. The Community Authorization Service (CAS) is an authentication technology which allows service providers to delegate some policy authority to the virtual organization. While in open distributed systems, provider join or leave the domain frequently, so access-control policy in the server changes quickly. To reduce the server load, threshold...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.