The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-Physical System (CPS) is a system that integrates physical system with cyber capability in order to improve the physical performance [1]. Up to now, it has been widely applied in people's daily lives. After research and discussion in recent years, we believe that most researchers already have a comprehensive understanding about CPS. This paper systematically introduced CPS's conception, development...
Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS...
Stuxnet event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications...
Industrial control system (ICS) plays an important role in the critical infrastructure, and any compromise in their security can result in grave consequences. Since the occurrence of “Stuxnet” event in 2010, the information security problems of ICS cause the intense attentions all over the world. How to assure the security of ICS has become a hot topic in governments, industrial sectors and academic...
Software assurance in software development process becomes an important part of ICT supply chains risk management, and also has been one of the most advanced information security technologies. Based on the researches of software assurance, this paper studies the development and current research of software security assurance in the background of software security being concerned by more and more people,...
Important users are high-status vertices in social networks. They are everywhere in most fields of society and have big impact on those around them. Although a lot of effort has been made on identifying important users, the efficient methods still need to be developed, especially for the web users from Sina microblog, which is the most popular social networking sites in China and has unique characteristics...
Cloud computing is the delivery of computing and storage capacity as a service to users. Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage. As fast development and application of cloud computing and cloud storage, users concern more and more about security and privacy...
Archiving Internet traffic is a function essential for retrospective network event analysis. The state-of-art approach for network monitoring and analysis is storing and analyzing the statistics of network flows. However this approach loses much valuable information inside Internet traffic. With the advancement of commodity hardware, especially the volume of storage device and the speed of interconnect...
Internet Protocol Television (IPTV) is a critical service in converged networking environment. It promises to deliver a world of content and services to “any device, anywhere, anytime.” The number of global IPTV subscribers is expected to grow from 28 million in 2009 to 83 million in 2013, and the global IPTV market revenues are forecasted to grow from US$12 billion in 2009 to US$38 billion in 2013...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.