The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to detect the Cross-Site Script (XSS)vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, optimizes the attack vector repertory using an optimization model, and detects XSS vulnerabilities in web applications dynamically. To optimize the attack...
Currently, major Internet services are designed for consumer/personal usage and it tightly depends on service provider, which shows trends on monopolization. In this paper, we propose a new Internet service model, PHCMM, based on systematic and thorough summary of contents' lifecycle. Equipped with PHCMM, we identify and analyze existing Internet service patterns. Subsequently, we design a novel distributed...
MIPv6 is one of the dominating protocols that enable a mobile node to maintain its connectivity to the Internet when moving from one access router to another. However, it suffers from long handoff latency and routing inefficiency. In this paper, we present a novel distributed mobility management scheme, ADA (Asymmetric Double-agents Architecture), which introduces two mobility agents to serve one...
This paper presents the carrier based pulse-width modulation (PWM) strategy in overmodulation region of three-level inverter. The optimal modulation signal is derived from the end of the three-level space vector undermodulation. As the magnitude of modulation signal increases, the modulation mode varies from the end of undermodulation to overmodulation mode-1, and then to mode-2, the waves of phase...
In heterogeneous wireless networks, handoff can be separated into two parts: horizontal handoff (HHO) and vertical handoff (VHO). VHO plays an important role to fulfill seamless data transfer when mobile nodes cross wireless access networks with different link layer technologies. Current VHO algorithms mainly focus on when to trigger VHO, but neglect the problem of how to synthetically consider all...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.