The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The explosive development of mobile communications and networking has led to the creation of an extremely complex system, which is difficult to manage. Hence, we propose an AI-powered network framework that uses AI technologies to operate the network automatically. However, due to the separation between different mobile network operators, data barriers between diverse operators become bottlenecks...
Security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in billions of dollars in losses per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are socio-technical — a mix of people, processes, technology and infrastructure...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
The impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is studied by analyzing some important factors, including the probability characteristic of the legitimate receiver (Bob) and malicious eavesdropper (Eve)'s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability, and the average secrecy channel capacity...
Communication protocol reverse engineering has played an important role in the field of network security. Inferring protocol state machine for unknown protocol is a part of protocol specifications mining. This paper proposed a novel approach in the mining of unknown binary protocol state machine. It allows to automatically generating the state models for binary protocol by listening to network traces...
Most of existing network testbeds can only support the experimentation of L2∼L4 forwarding protocols, leaving the evaluation of L4∼L7 applications still a tremendous challenge. This paper pioneers to present the design of sea-cloud innovation environment (SCIE) based on the software defined networking (SDN) and network functions virtualization (NFV) paradigms to support adaptive service-oriented experimentation,...
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements...
Vehicle License Plate of GA36-2007 has overcome most defects of GA36-1992, but there are still some disadvantages on visibility, uniqueness and intelligence. At present the automatic vehicle identification system is limited on image identification technology, which still has many shortages. In this paper, we propose a new type design of vehicle license plate and develop a matched secure automatic...
In order to overcome the shortages of visibility, uniqueness and intelligence existing in traditional vehicle license plate, we propose a new type design of license plate and develop a matched secure automatic identification system. We adopt new accumulating energy self-luminous material and RFID technology in the system, moreover secrete starting address and random number initialization are implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.