The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Episode Rule Mining is a popular framework for discovering sequential rules from event sequential data. However, traditional episode rule mining methods only tell that the consequent event is likely to happen within a given time intervals after the occurrence of the antecedent events. As a result, they cannot satisfy the requirement of many time sensitive applications, such as program security trading...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Linear network coding (LNC) is a promising technology that can increase network throughput, improve transmission robustness and provide data confidentiality. In this paper, we investigate the optimal transmission topology construction and LNC design for secure multicast, i.e., the Integer Secure Multicast (ISM) problem. The ISM problem aims to find the transmission topology with integral link rates...
With the development of internet, the network connection between Industrial Control System (ICS) and public internet has been becoming more and more closely. What's more, the traditional IT system attacks have been spread to ICS and become more frequently. However, the traditional security analysis of IT system is not enough to be applied to ICS. In this paper, we present a tool called Attack Path...
Linear network coding (LNC) has great advantages in optimizing throughput, balancing network load, increasing robustness, etc. Since the coded data packets transmitted in the network are linear combinations of original data packets, the attacker cannot decode to obtain the original data when it cannot acquire enough coded data packets. Therefore, LNC can also provide efficient information security...
An unforeseen event is a threat that can interrupt the operational process and has negative impacts on a supply chain system. To reduce the risks and improve the service level, hazard identification is one of the significant procedures in supply chain risk management (SCRM) to recognize the causes of undesired events across the supply chain network. However, the most SCRM studies in the chemical industry...
The continuous growth of media-rich content calls for more efficient and secure methods for content delivery. In this paper, we will address the optimal linear network coding (LNC) design for secure unicast streaming against passive attacks, under the requirement of information theoretical security . The objectives include 1) satisfying the information theoretical security requirement, 2) maximizing...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the rank of trust for data owner is low. Verifiers are not willing to check data of the owners. Hence, in this paper, we propose the first double delegable PDP scheme, in which both...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the PDP schemes...
Cloud storage is now an important developmenttrend in information technology. However, informationsecurity has become an important problem to impede it forcommercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDPschemes. We show that the property of correctness cannot beachieved when active adversaries are involved in these auditingsystems...
Linear network coding (LNC) has attracted significant attention because it has the potential to achieve the throughput capacity of a network. However, transmission systems with LNC are vulnerable to pollution attacks in which normal packets will be corrupted by malicious relay nodes and participate in normal encoding process. The null keys based error detection schemes have been designed to efficiently...
This paper proposes an algorithm fast searching for key transmission section based on power component of line. Firstly, graph theory is used to calculate the real power transfer among individual generators and loads, then classify the lines based on the Ward's cluster analysis method to search the set of lines which have the similar power component to overload line, finally determine the parallel...
Nowadays, enterprises and individuals are increasing tending to store their data in the cloud storage systems, yet, these sensitive data will face serious security threats. Currently, cloud storage service providers mainly adopt encryption and authentication to protect sensitive data, and a lot of approaches have been proposed to ensure data security in cloud storage systems. Recently, audio steganography...
In this paper, we study the optimal design of linear network coding (LNC) for secure unicast against passive attacks, under the requirement of information theoretical security (ITS). The objectives of our optimal LNC design include (1) satisfying the ITS requirement, (2) maximizing the transmission rate of a unicast stream, and (3) minimizing the number of additional random symbols. We first formulate...
In wireless sensor networks (WSNs) sensors may be deployed in unpredictable environment, a limited energy of the sensor nodes has led to the development of the Energy-efficient Data Privacy Protection Scheme (EDPPS). It is a process of ensuring privacy and security to the sensed data as well as maximizing the network lifetime. Many schemes have been proposed using symmetric key cryptography algorithm...
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. The purpose of this work is to design secure linear network coding against wiretap attack. The problem is to maximize the transmission data rate of multiple unicast streams between a...
The core of fuzzy evaluation on the safety of chemical industrial park is membership degree transformation. But the transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information...
Nowadays, IP networks are suffering many faults and malicious attacks, which greatly threaten its security and survivability. So it is an important issue that how to make the IP networks to be more resilient under faults and attacks, i.e., to improve their tolerance abilities for both fault and intrusion. However recently, most of the researches focus on only one of them, and decouple the survivability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.