The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Protection of memory is very significant for preventing computer system from vulnerabilities, malware or runtime reverse engineering. We introduce SecPage (Secure Page), a new hardware/software memory protection architecture. New architecture provides isolated memory environment to protect sensitive code and data. The security of SecPage mechanism is achieved by adding extensional dedicated instructions...
This paper observes the boundary of distribution system security region (DSSR). DSSR is defined as a set of all the operating points satisfying N-1 security constraints. First, the basic concepts of N-1 security are introduced for distribution system under smart grid background. Then, the dividing phenomenon of operating points security is reported, which indicates that DSSR boundary of a given distribution...
SDN is a concept of programmable networking. A network manager can process each network flow through software programs. There is a hypothesis that all switches are trusted and follow programmed commands to handle packets. That is, once a switch is compromised by an attacker and does not follow the order of the network manager, this will bring a huge network disaster. In this paper, we define some...
In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We investigate the question of which role should the helper act to improve the secrecy, to jam, or to relay. Two transmission schemes are investigated: 1) direct transmission scheme (DTS) with jamming and 2) relay transmission scheme (RTS)...
Facing the increasingly fierce competition and the expanding risks, commercial banks need to achieve optimal management of bank credit risk by the scientific evaluation method. Risk-adjusted EVA takes into account of risk factors on the basis of traditional EVA, and the introduction of risk-adjusted EVA to the commercial bank credit performance evaluation system could fully reflect the bank's operating...
Due to the active defense of benign worms against the damage imposed by worms, benign worms have been paid enough attention by network security researchers. This paper presents patching structured benign worms, and we designed their deployment and work mechanism. Furthermore, the process of patching structured benign worms countering against worms is modeled based on the infectious model. Finally,...
This paper introduces the concept of failure probability to measure the security level of communication tasks with different protection modes. Based on failure probability analysis, we develop three differentiated protection services provisioning strategies which can provide security level guarantee and network-resource optimization for workflow-based applications in optical grid.
Early Warning System on grain is a warning system, which is used to prevent the yields of grain from going possibly abnormal in practice. The paper focuses on analyzing the regional wheat production. As it is based on former studies, which are actually very contributive, the analysis of regional wheat production in this paper instructs the research to the building of grain early warning model such...
The nature of mobile ad hoc networks make the routing is highly dependent on cooperate behavior between nodes, and using reputation mechanism can enforce cooperation among the nodes to prevent selfish behavior. This article proposes a functional ontology for reputation routing mechanisms base on node behavior. In this ontology, the functional structures and conceptualize that compose the reputation...
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service...
In the fault diagnosis of the plane steering surface, exact fault prediction is very important for the security of the aircraft. According to design requirement of the plane steering surface fault prediction system, the application of neural network technique is plane fault prediction is presented, and the algorithm based on the neural network model in the prediction system is given. Considering the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.