The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a novel polarization mode dispersion (PMD) monitoring method by adding auxiliary optical signal is presented. Based on four-wave mixing (FWM), the PMD can be monitored in all-optical domain by measuring the power of the idler wave. With the help of auxiliary signal, the change trend of idler wave power with PMD will be enlarged, which expands the scope of monitoring and improves the...
With the introduction of virtual machine introspection into IaaS cloud, indirect inspection of the state about guest VMs is supported with strong isolation. But it requires the privilege access to the virtual machine monitor and lacks manageability due to the need of installing various security vendors' agents in a privileged VM. In this paper, we propose an agentless and uniform introspection framework,...
We propose a first-order Polarization Mode Dispersion (PMD) monitoring technique for phase-modulated optical signals utilizing the cross-phase modulation (XPM) effect between the input signal and the inserted continuous-wave probe in parallel connection. Because of accumulation of PMD, the XPM effect in nonlinear fiber leads to variation of pump phase. This can cause spectrum broadening resulting...
Causal-based alert correlation is one of the mainstream techniques to detect multi-step threat behaviors. However, because large-scale network generates high-speed alerts and alert type distribution in dataflow changes over time, it is challenging to increase generality, scalability and reduce overhead for causal alert correlation method. In this paper, we propose a novel general, scalable and low-overhead...
Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big...
BackgroundSafe Implementation of Thrombolysis in Stroke‐Non‐European Union World was a multinational, prospective, open, monitored, observational study of intravenous alteplase as thrombolytic therapy in clinical practice. Safe Implementation of Thrombolysis in Stroke‐Non‐European Union World was required to assess the safety of alteplase in an Asian population by comparison with results from the...
This paper propose a new method for de-tecting distributed denial of service (DDoS) attack. By using the monitors on the edge network to record the traffic information in a Sketch matrix, we can get the suspicious attack traffic information as the local detec-tion result. Then, all the monitors that have found sus-picious information about the same destination IP or-ganize into an AutoTree to collaborative...
The effect of plasma produced and the power energy efficiency on the generation of hydrogen peroxide in high voltage discharge process were investigated. The energy put into the discharge region was used to generate active radicals, then to form hydrogen peroxide and nitrate. With increasing the voltage, the energy efficiency of hydrogen peroxide production decreased. While increasing air flow rate...
Failure detection is a significant challenge in most overlay network systems. And the choice of parameter configuration for a given failure detection scheme has a significant impact on the performance of the scheme. In the traditional coarse-grained parameter configuration (CGPC) model, the parameter configuration for each failure detecting process is uniform. In this paper, we analyze the disadvantages...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.