Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and frequently varying Web contents. A nonlinear mapping function is introduced to protect weak signals...
Object Naming Service (ONS) provides a connection between the middleware of Electronic Product Code (EPC) and EPC Information Services (EPCIS). The communication security of EPC network mainly depends on the queries of ONS. In the process of an ONS query, the local server sends DNS query messages in plaintext, which may result in the leakage of EPC information. In this paper, we propose a security...
A complex software system may have hundreds of tuning parameters with both itself and its runtime environments. To perform optimally at runtime, a self-adaptive system often needs to employ a series of controllers to tune different parameters. In most cases, these parameters are not independent but interact with each other, thus demanding effective coordination among different controllers. Due to...
This paper is focused on a new type sneaky HTTP attack which has no obvious anomaly characteristics. A new light-weight anomaly detection scheme is introduced for large-scale Web sites whose workload is much heavier and more bursty than the general Web sites. Based on stack distance values of HTTP requests, an improved event-driven hidden semi-Markov model is applied to describe the stochastic process...
Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. DDoS attacks are typically carried out at the network layer. However, there is evidence to suggest that application layer DDoS attacks can be more effective than the traditional ones. In this paper, we consider sophisticated attacks that...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.