The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Rapid pace of global urbanization has posed significant challenges to urban transportation infrastructures. Existing urban transit systems suffer many well-known shortcomings, where public transits have limits on coverage areas, and fixed schedules, and private transits are expensive and fail to timely meet the demand needs. We thus envision a Cloud-Commuting system, that employs a giant pool of centralized...
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
Labeling malware samples with their appropriate malware family helps understand and track malware evolution and develop mitigation techniques. Current malware analysis techniques that use supervised machine learning rely on classification models that are trained on malware traffic generated from a sandbox environment. These models are then used to classify future unseen observations. In practice,...
DNS has been increasingly abused by adversaries for cyber-attacks. Recent research has leveraged DNS failures (i.e. DNS queries that result in a Non-Existent-Domain response from the server) to identify malware activities, especially domain-flux botnets that generate many random domains as a rendezvous technique for command-&-control. Using ISP network traces, we conduct a systematic analysis...
Many real-world (cyber-)physical infrastructure systems are multi-layered, consisting of multiple inter-dependent networks/layers. Due to this interdependency, the failure cascade can be catastrophic in a inter-dependent, multi-layered system, and even lead to the break-down of the entire system. The 2003 blackout of the Italian power grid is reportedly the result of a cascading failure due to the...
In this paper, we provide a detailed analysis on the venue popularity in Foursquare, a leading location-based social network. By collecting 2.4 million venues from 14 geographic regions all over the world, we study the common characteristics of popular venues, and make the following observations. First, venues with more complete profile information are more likely to be popular. Second, venues in...
Internet technologies are making rapid progress, but achieving high performance of network application over the WAN remains a challenge. When branch office's workers access enterprise applications locating in data center, the performances drop dramatically. To solve this problem, many hardware accelerators are produced. In this paper, we introduce a Software-only IP Network Application Accelerator...
The detection of artillery inner-chamber flaw is an important task in artillery development, production and maintenance. Owing to the special structure and lathy space of gun, the processing of flaw images has many difficulties. In this paper, aiming at the problem of single image can not show a larger flaw integrally, the improved splice method based on log-polar coordinate mapping and phase correlation...
Linguistic steganography is an art of concealing secret messages. More specifically, it takes advantage of the properties of natural language, such as the linguistic structure to hide messages. In this paper, an effective method for linguistic steganography detection is presented. In virtue of the concepts in area of information theory, the method uses an information entropy-like statistical variable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.