The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
The development of high voltage technology provides technical conditions for the transmission of offshore new energy, but it is necessary to consider the operation status of power grid when we decide the way of grid connection. This paper focuses on the stability of the system and evaluates three access form — the high voltage alternating current (HVAC), traditional direct current (DC) and flexible...
The “Regulation on the Emergency Response, Investigation and Handling of Electric Power Security Accidents”, based on load-shedding proportion, namely the Decree No.599 of the State Council of the People's Republic of China, was implemented on September 1st, 2011, which proposed new more stringent requests for power system reliability and security. Combining with related regulations on the Decree...
Dedicated short-range communication (DSRC) is an enabling technology for Intelligent Transportation Systems (ITS). Due to lack of stable topology, the periodic and event-driven safety applications take broadcast as an effective approach to disseminate messages, which leads to significant performance degradation in high density and highly dynamic scenarios. This paper presents an information theory...
The massive integration of wind power brings more challenges to the safe operation of power system. In this paper, risk assessment methods of power system with wind power integration are studied by using DSR (dynamic security region) and risk assessment theory. The basic construction method of DSR boundary is introduced. The risk index calculation and comprehensive analysis method of wind power integration...
To meet the need of signal acquisition for Digital Radio Mondiale (DRM) equipment in communication security application, an embedded system is set up by combing signal acquisition and decoding module, host computer monitor module and PC104 bus control module, taking advantage of high data transmission efficiency on PC104 bus. Signal data is acquired and decoded by signal acquisition and decoding module...
In this paper, we conduct a comparative study on two different text features in text corpus clustering: TF*IDF feature and Topic feature. The former is mainly used in similarity-based text corpus clustering methods, while the latter, which is produced by LDA model, is used to identify the topics of texts. We conduct clustering experiments on 20-newsgroups (20NG) datasets. Based on the dataset, two...
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed...
Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically proven lower bounds have shown that secure...
With the application of e-government becomes more and more extensive, the security issues become increasingly important. The paper firstly presents a relatively complete e-government security risk evaluation index system basing on comprehensive analysis of risk factors which affects e-government security. Then we conduct orthogonal transformation to the indexes for eliminating duplication between...
Measurement and control information should be transmitted in time between devices in Bluetooth Home Control Network (BHCN) to provide a safe and efficient environment. A scheme for improving real-time performance of BHCN is discussed in this paper. Taking ??C/OS-II which is a real-time OS as platform, Embedded Bluetooth Home Server (EBHS) is constructed as the core of BHCN to realize centralized control...
In this paper, a new image encryption algorithm is presented based on Henon chaotic maps in order to meet the requirements of the secure image transfer. There are several parameters in this kind of chaos system, and it is sensible to the original value and unpredictable. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.