The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's online social networks (OSNs) do little to protect users' private information especially relationships between them. This paper presents PrivOSN, an online social network system designed to be more private than existing systems while keeping neutral performance, preserving existing services, and defending against kinds of attacks already known. In PrivOSN, users' relationships are kept locally...
With the society's advocacy of "low-carbon energy-saving" way of life, saving energy has been a heated topic. Although the street lamp is an indispensable part of the basic facilities of a city, its large energy consumption at present has wasted a lot of natural resources. In order to solve this problem, many scientific researchers provide many solutions by using software or hardware methods...
A wireless Ad Hoc network is an infrastructureless self-organizing network. Access control problem of strangers may happen because of its strong openness. Trust management based on policy can dealt with such problem, which can deliver access control policies to strangers through credential-delegation to give them permissions. But the delegation frameworks are somewhat coarse-grained and subjective...
The reactive computational model is pervasively used as a proper abstraction of web-based applications which receive inputs and generate outputs throughout execution. The present static enforcements of information flow security on reactive program are either based on type system or abstract interpretation. In this work we first propose an approach using automated verification to check conformance...
Private attributes of Online Social Network (OSN) users can be inferred from other information (which is usually from users' friends and group information). To address this, social networking sites allow users to hide their friend lists and group lists, so that general public cannot see them. However, if a user doesn't make his friend list public, but his friends have public friend list where we can...
Automated verification of noninterference is commonly considered more precise than type-based approach on enforcing secure information flow for program. We propose an approach on model checking symbolic pushdown system generated from Java bytecode, and develop a deployment-time verification framework to ensure noninterference of bytecode. In order to overcome the constraints brought by the nature...
Tagging systems are known to be particularly vulnerable to tag spam. Due to the self-organization and self-maintenance nature of Peer-to-Peer (P2P) overlay networks, users in the P2P tagging systems are more vulnerable to tag spam than the centralized ones. This paper proposes SpamResist, a novel social reliability-based mechanism. For each tag search, SpamResist client groups the search respondents...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
Digital signal processing is one of the most important techniques in 500 MHz NMR spectrometers. Free Induction Decay (FID) signal should be quadrature-demodulated from 20 MHz intermediate frequency (IF) signal, decimated to a user-defined sample rate and spectrum width. In the design of digital processor of NMR spectrometer console, the techniques of Software Defined Radio (SDR) are applied to achieve...
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
This paper presents an analysis of the unbalanced operating situations of a medium-voltage distribution feeder whose arrangement is changed from an open-loop to a closed-loop type. First, a sample system involving an open-loop distribution feeder is constructed. Second, the sample system is modeled and simulated by the OrCAD PSpice simulation software. The transformers and feeders in the sample system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.