The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking (NDN) is a clean state Internet paradigm that considers some security primitives in its original design, and one of the promising candidates for the future Internet architecture. However, it may suffer from the specific threats such as Interest Flooding Attacks (IFA). Most researches are focused on the defense against fake IFA, where the PIT resources in victim routers are exhausted...
In this paper, the security in a device-to-device (D2D) spectrum sharing network is investigated. The cellular users and eavesdroppers are distributed according to two independent Poisson Point Processes (PPPs), and the positions of the D2D transmitters follow a hard-core point process. Based on the stochastic geometry, we first derive closed-form expressions of the connection and secrecy outage probabilities...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
Characterizing mobile traffic is important to network operators from a network performance and security standpoint. In many cases, such as a performance degradation or security threat, it is useful to know that traffic is being generated by a specific mobile application. Recent methods for identifying mobile traffic have relied on computationally expensive detailed inspection of HTTP flows which may...
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns...
with the increasing popularity of network technology in China, the new mode of shopping, trading, payment through the Internet is developing rapidly. E-commerce with its low cost, high efficiency advantages, not only enjoyed by ordinary consumers, but also effectively promotes the small and medium enterprises to find business opportunities to win the market. It has become China's transformation of...
Along with the gradually development of the national economy, as well as the increasing aging population, now days improving the pension insurance system of urban workers has been gradually put on the agenda. In the basic social insurance, the pension insurance is the most popular, but the formation is a short time in Heilongjiang province. This paper analyzed the system environment of pension insurance...
Though research on the overlay network has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the overlay networks is a large, uncensored system to which anyone may contribute. This raises the question of how much dependability to give each information source. Traditional overlay network simulators provide accurate low-level models of...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
Betweenness centrality is a fundamental centrality measure that quantifies how important a node or an edge is, within a network, based on how often it lies on the shortest paths between all pairs of nodes. In this paper, we develop a scalable distributed algorithm, which enables every node in a network to estimate its own betweenness and the betweenness of edges incident on it with only local interaction...
The use of mobile devices has been increasing for the last decade. With more powerful capabilities, they are replacing desktop computers. With this, there are also security concerns, one of which is the user authentication. When dealing with mobile phones, an important aspect is usability, as often users may play more importance to how usable programs or functionalities are than how secure they may...
Through most of captcha images all said that their system can defense the external attacking, many corresponding researches are still presented to examine the captcha systems in the current internet platforms. The safety of captcha image can be decided by the complexity of imaging structures. Therefore, different captcha recognition methods are proposed to apply into different captcha images. In this...
With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion...
Minimization of perceptual and statistical distortions is one of the main challenges facing steganographic schemes. The most common approach to minimizing perceptual distortion is Least Significant Bit embedding. However, the statistical features (e.g., histogram) of the stego-images may be changed significantly even with selection of the regions of interest in the embedding process. This opens security...
In multimedia communication, various data rates, security strategies, and data qualities are required for different content forms such as text, audio, images, video, and interactivity content forms. In this paper, we propose a secure and robust approach to achieve the multimedia multiple access (MA) communication using self-encoded spread spectrum (SESS). In this proposed system, SESS multiple access...
Escalator is a vehicle closely related to people's daily life, yet sometimes it incurs safety problems. Therefore, developing new methodology for escalator safety assessment is very important. In the various stages of the risk management, this paper proposes related suitable risk analysis models for the escalator overturned accident. The research in this paper mainly includes four parts: Firstly,...
Besides a large set of malware categories such as worms and Trojan horses, Advanced Persistent Threat (APT) is another more sophisticated attack entity emerging in the cyber threats environment. In this paper we propose a model of the APT detection problem as well as a methodology to implement it on a generic organization network. From our knowledge, the proposed method is the first to address the...
The management of soldiers is a frequent and general work in the construction of grass-roots fire army and a key point to improve comprehensive construction and quality construction of the army. The paper starts from the practical requirements of the management of grass-roots soldiers of municipal fire brigade to describe the functions and performance requirements of the system, analyze the process...
A computational model of multi-scale population densities was developed based on the native population database of Shijiazhuang city. The model comprises four parts: data processing, down-scaling, data format conversion and up-scaling. Down-scaling was completed by apportioning village population to each street block. The vector dataset of block population was converted into 100m×100m grid dataset,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.