The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of information technology, software plays an increasingly important role in the process of social development. However, at the same time, the number of software vulnerabilities is growing, posing a threat to national security and social stability. Therefore, some scholars and research institutions are paying their attention to the study of software vulnerability. In this paper,...
The vulnerability of a network may suffer tremendous economic losses. From the perspective of network nodes, network security depends not only on the behavior of a node but also on that of its neighbours. We propose a non-cooperative networking vaccination game with economic incentive mechanism under a susceptible-infected-susceptible (SIS) epidemic process. In the game each node individually decides...
Internet of vehicles(IOV) is an application of Internet of things in Intelligent Transport System, and has attracted high attention of researchers. IOV brings network connectivity to traditional vehicles, while also introduces security risks. This paper presents experimental analysis on the security of vehicles with Internet connections and propose an approach to Controlling a Car Through OBD Injection...
Physical (PHY) layer security has recently become a hot issue in wireless communication. In this paper, an approach to a generalized anti-eavesdropping space-time network coding (GAE-STNC) for cooperative communications is proposed to achieve the physical layer security and overcome the problem of imperfect synchronization while still guaranteeing full diversity. Based on the assumption of channel...
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation on prefix hijacking and the Internet hierarchy is presented...
With the large-scale distributed system plays an increasingly important role in such fields as national security, critical infrastructure and social life, its vulnerability analysis problem has become a growing focus nowadays. As a vulnerability analysis object, a multi-layer model is put forward firstly, and then a multi-dimension vulnerability analysis framework of large-scale distributed system...
Voltage stability is a crucial factor in power system operation. When bus voltage exceeds the operation limits because of change of the operation mode, load in the network or the environmental factors, appropriate control actions should be taken to guarantee a secure system operation, avoiding emergency situations or voltage collapse. Development and improvement of the algorithm for voltage security...
Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introduced the Vulnerability analysis methods for communication network, command & control network, mobile ad hoc network and satellite network. At...
The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network...
Within the framework of credibility theory, several fuzzy portfolio selection models have been researched such as mean-variance model, chance constrained programming model, entropy optimization model and so on. However, all of them are proposed in the forms of single-objective programming, and there is no investigation on the transaction costs between the new portfolio and the existing one. In this...
The trace equivalence relation is analyzed and proved by the property of cyclic group, and the XTR security decreasing caused by the equivalence relation is discussed. To cope with this problem, an improved algorithm was proposed to eliminate the equivalence relation effectively. The improved algorithm is compatible with the old speedup algorithm. Furthermore, the algorithm is more effective to improve...
With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of payment. TLA is One kind of logic brought forward...
In order to decrease unfair evaluations to service peers in peer-to-peer network, a trust model based on the declaration of preference is proposed in this paper, which considers the similarity between two peers' preferences. The trust model gives the declaration of preference, and proposes algorithms to carry out the computations. Experiments show that our model is better than the trust model without...
A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain business goals. The Web services-based business processes with a new set of protocols bring a new set of security challenges. As security has become an essential component for all software, several security solutions for XML and Web services have been proposed. In general,...
Summary form only given. A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain business goals. The Web services-based business processes with a new set of protocols bring a new set of security challenges. As security has become an essential component for all software, several security solutions for XML and Web services have...
Active content transformation in Web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.