The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of bulk power grid under extra-high voltage (EHV) AC/DC hybrid power system and extensive access of distributed energy resources (DER), operation characteristics of power grid have become increasingly complicated. To cope with new severe challenges faced by safe operation of interconnected bulk power grids, an in-depth analysis of bulk power grid security defense system...
Wireless sensor networks are responsible for sensing, gathering and processing the information of the objects in the network coverage area. Basic data fusion technology generally does not provide data privacy protection mechanism, and the privacy protection mechanism in health care, military reconnaissance, smart home and other areas of the application is usually indispensable. In this paper, we consider...
New energy grid integration has become the main application field of large scale energy storage. The controllability of new energy power output can be effectively improved by using energy storage device with quick response capability. Aiming at the current status that the control target of wind-energy storage combined generation system is single and the reactive power control ability is not fully...
GNU Libc (GLIBC) is the standard C runtime library of most Linux distributions for PC and servers. There used to be many memory corruption exploit techniques against ptmalloc, the default heap allocator of GLIBC. But the widely deployment of mitigations like NX and ASLR on modern operating systems and continuous patching to ptmalloc effectively obsolete most of these techniques. We believe security...
As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing...
The purpose of this study is to investigate the cloud computing service security and access, by taking into account the service provider, and the customer's concerns. New trends of challenges from the two types of concerns are identified based on literature review. Especially, strategies to deal with the challenges in the mobile environment are proposed. It is expected that practitioners will be able...
Data preprocessing plays an essential role in the process of safety equipment linkage system, directly influenced the quality and the results of the later analysis and decision-making. This paper describes the process of data preprocessing in detail, and according to the characteristics of the linkage system data, proposes an improved data cleaning method in order to improve the efficiency of data...
There are a mass of researches on the issue of scheduling in cloud computing, most of them, however, are bout workflow and job scheduling. There are fewer researches on service flow scheduling. Here we propose a model of service flow scheduling with various quality of service (QoS) requirements in cloud computing firstly, then we adopt the use of an ant colony optimization (ACO) algorithm to optimize...
The worm is still one of the most serious threat to the Network security. The logical worm propagation model could characterize the propagation of Internet worms more exactly, and could be more helpful to carry out the worm protection, detection and suppression technology research. In the initial phase of this paper, a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was...
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is used for the messages from private vehicles and identity-based signature for public vehicles and RSU, further more, it employs batch message-processing...
To facilitate the management of patient records, traditional paper-based patient records have been modified into electronic medical records and then into electronic patient records. This study proposes a key management scheme based on Lagrange interpolation formula and hierarchical management structure to make Mobile Agent a more secure and efficient access control scheme for electronic patient records...
There are many availability-related requirements from the user, business and IT service providers, such as service availability, maintainability, capacity, quality, reliability, survivability etc. In this paper, we propose a framework to effectively integrate the availability demands from different perspectives. The risk assessment framework is designed to coordinate with the management process defined...
This paper extends the basic theory of spot price to incorporate power system security issues and presents a price decomposition method based on optimal power flow (OPF), which can supply security prices corresponding to different security constraints. Transient stability and static voltage stability restrictions respectively expressed as practical dynamic security region (PDSR) and static voltage...
Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep...
The integer sign vulnerability is a comparatively new and subtle type of vulnerabilities, they can compromise system security. Especially, if a sign vulnerability occurs in operating system kernel, it may result in very serious invalid read/write operations to kernel memory area. Unfortunately, little attention has been paid to static detecting them automatically. This paper presents a novel approach...
m-health promises a great vision for future medical relevant activities. Security and privacy are prime measures to strengthen trust in this ecosystem. Federated identity management (FIDM) is to identify people, applications, platforms or devices in an m-health federation. This paper describes scenarios of m-health, generalizes requirements of FIDM, and maps some standards of Web services to provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.