The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and frequently varying Web contents. A nonlinear mapping function is introduced to protect weak signals...
Object Naming Service (ONS) provides a connection between the middleware of Electronic Product Code (EPC) and EPC Information Services (EPCIS). The communication security of EPC network mainly depends on the queries of ONS. In the process of an ONS query, the local server sends DNS query messages in plaintext, which may result in the leakage of EPC information. In this paper, we propose a security...
A complex software system may have hundreds of tuning parameters with both itself and its runtime environments. To perform optimally at runtime, a self-adaptive system often needs to employ a series of controllers to tune different parameters. In most cases, these parameters are not independent but interact with each other, thus demanding effective coordination among different controllers. Due to...
This paper is focused on a new type sneaky HTTP attack which has no obvious anomaly characteristics. A new light-weight anomaly detection scheme is introduced for large-scale Web sites whose workload is much heavier and more bursty than the general Web sites. Based on stack distance values of HTTP requests, an improved event-driven hidden semi-Markov model is applied to describe the stochastic process...
Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. DDoS attacks are typically carried out at the network layer. However, there is evidence to suggest that application layer DDoS attacks can be more effective than the traditional ones. In this paper, we consider sophisticated attacks that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.