The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since traditional game theory applying to network attack and defense has the restriction of complete rational, we establish non-cooperative evolutionary game model of network attack and defense on the premise of bounded rationality, and solved by the replicator dynamic equations. For the strategy learning evolution process of defender, we use the Best-response dynamic learning mechanism to establish...
Code-reuse attack is a growing threat to computing systems as it can circumvent existing security defenses. Fortunately, control flow integrity (CFI) is promising in defending such attack. However, former implementations generally suffer from two major drawbacks: 1) complex pre-processing to obtain control flow graph; 2) high overhead. In this paper, we propose a cross-layer approach that employs...
In this paper, we propose a hybrid time-frequency domain chaotic interleaving technique for physical-layer security enhancement in orthogonal frequency division multiplexing-based passive optical network (OFDM-PON) systems. The chaotic interleaving is performed by using the discrete Baker map, which is controlled by a Henon map. The initial values and the iteration parameter of the Henon map are used...
Complex Event Processing refers to different mechanisms such as event correlation and event patterns detection for processing multiple events with the goal of inferring the complicated ones. While a simple event may provide trivial information, combining several of them can help in deriving more useful information. Detecting the complex events requires huge processing capability. The existing hardware...
Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg...
In recent years, extraordinary bad and bad chemical accidents caused by hazardous chemicals leak become frequent in China, but fire brigades are very short of pressure emergency leakage sealing test device and simulated training device for response. Shanghai Fire Research Institute of the Ministry of Public Security has developed a set of multi-functional pressure emergency leakage sealing test and...
Trusted Platform Module (TPM) has gained its popularity in computing systems as a hardware security approach. TPM provides the boot time security by verifying the platform integrity including hardware and software. However, once the software is loaded, TPM can no longer protect the software execution. In this work, we propose a dynamic TPM design, which performs control flow checking to protect the...
Graphics Processing Units (GPUs) have become a popular choice for general-purpose high-performance computing. Encryption and decryption algorithms such as the Advanced Encryption Standard (AES) have been implemented on GPUs to gain significant speedup. However, the security of the GPU architecture is not well studied, making it potentially risky to offload sensitive computation to GPUs. In this paper,...
Phased-Mission System (PMS) is a kind of typical complex systems. Most weapon systems executing battle mission and usage mission belongs to this type of complex systems. PMS and its' mission sustainability evaluation parameters included mission reliability, dependability, and mission effectiveness are given. In view of the usage characteristics of fact weapon system, some hypotheses are given for...
The functional deficiency of the Internet architecture enables attackers the ability to easily to spoof IP source address. The traditional signature-and-verification based anti-spoofing methods are often limited by essential process based on an explicit analysis and process of the IP header and does not adapt to incremental deployment. This paper designs a multi-fence countermeasure based inter-domain...
Empirical studies have divergence on whether the false information can affect market in the long term or not. Theoretical model can only explain part of these empirical studies. In this paper, we incorporate information diffusion model into an agent-based artificial market and test if the difference of investment experience leads the long time impact of false information. Our result provides an explanation...
Security is the key issue of Mobile Agent system, concerning about host and Mobile Agent itself. This paper analyzes the Mobile Agent_based software framework and its security issues. The current mainstream security technology of the network host supporting Mobile Agent is discussed. A new mechanism of network host security system combination of the latest Internet security research in open platform,...
Geo-information network service has become more and more popular; however the practical application of vector data service is rare used. The main reasons are as follows: firstly, with the variety of vector data formats, the general format conversion cannot be applied data shared services; Secondly, Existing vector data service interface standard (such as WFS) is too simple, which doesn't meet the...
Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces Botnet-based distributed denial of service (DDoS) attacks and the characteristics of botnet, research botnet detection and control technologies, summarized the botnet trends.
With the development of wireless local area network (WLAN), the problem of WLAN security becomes increasingly severe. This article discusses the security issues that should be taken into consideration in the construction of WLAN. Besides, this paper comes up with two types of intrusion detection structures on the basis of infrastructure mode and mobile AD HOC network mode respectively, therefore,...
The paper Puts forward a novel feedback chaotic block cipher algorithm based on external key control. The prominent advantage of the algorithm is that the cipherkey of the system is composed of 128-bit external keys. The system parameters, initial conditions and iterations of the chaotic system generate dynamically in line with the ciphertext feedbacks. In this way, the randomness and complexity of...
WCF (Windows Communication Foundation) developed by Microsoft is a unified programming model for building SOA and it is highly extensible. The extensibility provides the ability to change the product more easily over time and the flexibility to custom WCF for fitting specific requirements of applications. The extensible characteristics are what make WCF a strong distributed application platform. In...
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. However, existing such approaches and tools have bad system performance because they perform slow symbolic execution on all instructions. This paper presents a new dynamic test generation technique and a tool, Hunter that implements this technique. Unlike other such techniques, Hunter combines...
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. However, such existing approaches and tools are not retargetable and can only find vulnerabilities over a specific OS because the execution trace is totally OS-independently recorded in these tools. This paper presents a new dynamic test generation technique and a tool, ReTBLDTG, short for...
WCF (Windows Communication Foundation), one of Microsoft's revolutionary products, represents a new step in distributed programming. In this paper, after the concepts of WCF are introduced, its pillars (SOA, interoperability and integration, unification) are discussed and layered architecture is explored, then the difference between WCF and Web services is summarized . Finally, current state of popular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.