The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, security problems in massive multiple-input multiple-output (MIMO) network draw more and more attention. In this paper, a security problem for a multi-pair massive MIMO two-way amplify-and-forward (AF) relay network is considered, where multiple users exchange confidential messages via a common relay equipped with large number of antennas. We propose an optimal power allocation scheme that...
In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security in the two-way relay network with an eavesdropper and a primary receiver. Cooperative beamforming and jamming are designed to maximize the secrecy rate with a total transmit power constraint of the relays and interference power constraint at the primary receiver. The beamformer weights...
Analyzing massive network and security logs that record network events is crucial for diagnosing network anomalies in large-scale network environments. Extracting log message formats is an important and necessary step to achieve the goal. However, it is time-consuming and costly to automatically and efficiently extract log message formats from massive network and security logs of many different types,...
We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors and detectors. We also describe how the framework...
In this paper I Describe the definition and characteristics of the smart grid. Systematically represent the characteristics, objectives and present status about the smart grid both in China and the United States. Based on the situation in China facing the deteriorating environment and energy crisis. How to develop China's Smart Grid in a efficient and reasonable way. At last, rom the research and...
with the worldwide increasing of Internet censorship, censorship-resistance technology has attracted more and more attentions, some famous systems, such as Tor and JAP, have been deployed to provide public service for censorship-resistance. However, these systems all rely on dedicated infrastructure and entry points for service accessibility. The network infrastructure and entry points may become...
Geo-information network service has become more and more popular; however the practical application of vector data service is rare used. The main reasons are as follows: firstly, with the variety of vector data formats, the general format conversion cannot be applied data shared services; Secondly, Existing vector data service interface standard (such as WFS) is too simple, which doesn't meet the...
Detecting the intrusion usually depends on predicting the regular data traffics in wireless sensor networks. However, in fact, the data traffics are certainly affected by noise. In this paper, the theory of wavelet threshold is adopted to remove noise to increase the forecast accuracy of data traffics in WSN. Several numerical simulation verified that the forecasting precision is high, and achieved...
Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications have emerged. However, to the best of our knowledge, only few efforts have been devoted to study the architecture as well as implementation details for building up a cloud computing system. In this paper, we present our design and implementation of\textit{Imperial...
Assessing and understanding the level of city ecological security are of great importance to sustainable urban development. According to the pressure-state-response model, the indexes of city ecology security assessment were chosen. Subsequently, the assessment model based on projection pursuit technology was set up and used for a case of Hefei city. The result shows that the ecological security level...
Differential power analysis is of great concern because it can be used to break implementations of almost any symmetric or asymmetric algorithm, and several countermeasures have been proposed to protect implementations of cryptographic algorithms except SMS4 cipher. In the present paper, we focus on the differential power analysis attack on SMS4 cipher, and suggest a secure masking scheme for SMS4...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.