The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the Internet routing reliability. Invalid routes generated by mis-configurations or malicious attacks will devastate the Internet routing system. In the near future, deploying a secure BGP in the Internet to completely prevent hijacking is impossible. As a result, lots of hijacking detection systems...
As road crashes are constrained to a one-dimensional space, this paper analyzes the spatial distribution of road crashes with a GIS-based network-constrained kernel density method. A dissolving procedure is introduced before road segmentation, which can significantly reduce the undesirable effects during the segmentation process. The result of the sensitivity analysis reflects that the bandwidth imposes...
Network protocols often have time constraints. Robustness testing of protocol with time constraints aims to detect vulnerabilities of its implementation. However, related theory is not well developed. This paper proposes a novel Timed NPEFSM model containing sufficient inputs with various time values and their processing rules to formalize protocol with time constraints. In order to test delay transitions,...
With the development of malicious code technology, the number of malicious code has continued to increase. So it is imperative to optimize the traditional manual analysis method by automatic malicious code analysis system. This paper presents AMCAS - an automatic malicious code analysis system. It includes malicious code static analyzer, dynamic analyzer and network behavior analyzer. Compared with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.