The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Protective measures for server invasions should not solely focus on events before an invasion occur. Recording and monitoring successful server invasions with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. Overlooking this will inevitably lead to detrimental data loss and stray away from the key issue...
Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, automatic solutions have become necessary. In this paper we address program vulnerabilities by static code analysis. First, we use flow-insensitive and interprocedural constraint-based analysis to extract...
Digital TV industry is developing rapidly recent years in China, which brings up generous commercial value and opens a great software market. However, this field is divided into more than 300 parts, where services are different from one to another. As a result, it's difficult to design software of the Set-Top Box for developers, and usually they have to change from one platform to another, in order...
Security trust model is an important research topic for the P2P application. This paper firstly analyzes the existing P2P network security trust models, and then puts forward a new P2P recommendation trust model based on the network of social relationships. The model provides different types of services to show the userpsilas interest in different areas, and gives recommendation based on the interested...
Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in breaking many cryptographic algorithms, especially those running in low-end processors in embedded systems, sensor nodes, and smart cards. Although many countermeasures to power analysis attacks have been proposed, most of them...
Based on entropy weight-based gray relational method, a new outcomes severity model of security assessment is put forward. This model mainly reflects severity degree and fully shows the influence degree of different factors affecting severity. And risk factor is introduced to assess the system security after contingencies, computed by the product of contingency probability and outcome severity degree...
This paper proposes a kind of security radio data transmission mode based on turbo codes for communication based train control (CBTC) system in urban mass transit, and presents the simulation and analysis with several different decoding algorithms in this paper, such as Bi-SOVA, SOVA, MAP and Max-Log-MAP. The results show that Bi-SOVA algorithm and max-log-MAP algorithm have better performance of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.