Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
The development of high voltage technology provides technical conditions for the transmission of offshore new energy, but it is necessary to consider the operation status of power grid when we decide the way of grid connection. This paper focuses on the stability of the system and evaluates three access form — the high voltage alternating current (HVAC), traditional direct current (DC) and flexible...
The “Regulation on the Emergency Response, Investigation and Handling of Electric Power Security Accidents”, based on load-shedding proportion, namely the Decree No.599 of the State Council of the People's Republic of China, was implemented on September 1st, 2011, which proposed new more stringent requests for power system reliability and security. Combining with related regulations on the Decree...
Dedicated short-range communication (DSRC) is an enabling technology for Intelligent Transportation Systems (ITS). Due to lack of stable topology, the periodic and event-driven safety applications take broadcast as an effective approach to disseminate messages, which leads to significant performance degradation in high density and highly dynamic scenarios. This paper presents an information theory...
The massive integration of wind power brings more challenges to the safe operation of power system. In this paper, risk assessment methods of power system with wind power integration are studied by using DSR (dynamic security region) and risk assessment theory. The basic construction method of DSR boundary is introduced. The risk index calculation and comprehensive analysis method of wind power integration...
To meet the need of signal acquisition for Digital Radio Mondiale (DRM) equipment in communication security application, an embedded system is set up by combing signal acquisition and decoding module, host computer monitor module and PC104 bus control module, taking advantage of high data transmission efficiency on PC104 bus. Signal data is acquired and decoded by signal acquisition and decoding module...
In this paper, we conduct a comparative study on two different text features in text corpus clustering: TF*IDF feature and Topic feature. The former is mainly used in similarity-based text corpus clustering methods, while the latter, which is produced by LDA model, is used to identify the topics of texts. We conduct clustering experiments on 20-newsgroups (20NG) datasets. Based on the dataset, two...
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed...
Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically proven lower bounds have shown that secure...
With the application of e-government becomes more and more extensive, the security issues become increasingly important. The paper firstly presents a relatively complete e-government security risk evaluation index system basing on comprehensive analysis of risk factors which affects e-government security. Then we conduct orthogonal transformation to the indexes for eliminating duplication between...
Measurement and control information should be transmitted in time between devices in Bluetooth Home Control Network (BHCN) to provide a safe and efficient environment. A scheme for improving real-time performance of BHCN is discussed in this paper. Taking ??C/OS-II which is a real-time OS as platform, Embedded Bluetooth Home Server (EBHS) is constructed as the core of BHCN to realize centralized control...
In this paper, a new image encryption algorithm is presented based on Henon chaotic maps in order to meet the requirements of the secure image transfer. There are several parameters in this kind of chaos system, and it is sensible to the original value and unpredictable. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.