The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do so manually by continuously collecting and evaluating...
Recent years witness the prevalence of IaaS (Infrastructure as a Service) cloud services. Virtual machines (VMs) are provided to users as a kind of product by IaaS providers. New computing architecture makes it difficult for traditional forensics tools to collect evidences from the target VM. In this paper, we propose a novel proactive forensic approach named VMForensics, which provides both dynamic...
In the paper, we modelling for information theft Trojan based on Stochastic Game Nets (SGN), a novel modelling method which good at multirole game problem described, and has been applied in many fields of networks with interactive behaviors. Combination the SGN and practical problem, we present an algorithm for solving the equilibrium strategy to computer the model of SGN. Finally we analyse our research...
Security chip is widely used in security equipment of power distribution and utilization, ensuring information security of control systems in smart grid. The paper analyzes the threat and protection, such as disturbance attack, side channel attack and data transmission attack, which the state cryptographic authentication security chip are faced with in terminals of power distribution and utilization...
Internet of Things (IoT), which will create a huge network of billions or trillions of “Things” communicating with one another, are facing many technical and application challenges. This paper introduces the status of IoT development in China, including policies, R&D plans, applications, and standardization. With China’s perspective, this paper depicts such challenges on technologies, applications,...
With the development of wireless access technology, many hosts have the ability to attach to multiple networks via Multi-InterFace(MIF). In order to communicate via multiple interfaces simultaneously and select a suitable one for each session, per-application preferences or sophisticated policy managers is implemented in some hosts, both of which are configured by users or controlled externally. Therefore,...
With the continuous rise in healthcare costs globally, there is growing interest in investigating new, innovative ways to improve the quality of healthcare provision. Healthcare providers are being held accountable for the ‘quality’ of healthcare outcomes, thus triggering a need to audit and evaluate the quality of healthcare provided. This paper presents a technology to monitor and asses the quality...
Delay boundary is an important topic for evaluating the service performance of network. In this paper, we focus on the delay boundary of the end-to-end in wireless sensor networks (WSN). We propose stochastic arrive curve model and stochastic service curve model based on stochastic network calculus (SNC), which can be applied to analyze the service performance of WSN. Then we derive the end-to-end...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.