The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, with national economy's change for better and rapid development of infrastructure construction, urban disasters which are categorized into man-made and natural result in sustainable development function of urban confronting with a serious threat and urban public security also confronting with unprecedented challenges. Naturally, more and more emphasis are put on community safety....
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers...
With the development of Internet technology and its applications, the boundary between virtual cyberspace and the real social environment is becoming indefinable. The cyberspace security has become a great threat and challenge which facing the governments and the whole society. Improve our technological capability of network trace-back is the basic way to solve the problem of Cyberspace Security....
Projects of integrated traffic terminals involve a great number of equipment systems, including ventilation, lighting, communication, power supply and electric supervision, water supply and drainage as well as fire fighting and integral supervision. The safe operation of these equipment and systems is an important control point for integrated terminals at operation phases. Therefore the study on operation...
Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring firewall policy correctly. Firewall policy describes the access that will be permitted or denied from the trusted network. In corporate network, several firewalls are set up and administrated by different teams. The consistency between those firewall policies is crucial to corporate...
Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring firewall policy correctly.Firewall policy is a lower-level policy which describes how firewall actually implements security policy. Security policy is a higher-level policy which defines the access that will be permitted or denied from the trusted network. Compare with software engineer,...
Denial of service (DoS) attack can be easily launched for the simple service discovery Protocol (SSDP) on Universal Plug and Play (UPnP). This paper proposes a novel DoS defense scheme on UPnP. The connection between UPnP devices and attack nodes will be limited, and the useless descriptions received by the UPnP control points will be filtered through setting packet-filter with traffic anomaly detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.