The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The distribution of Bluetooth mobile phone has the clear feature of cluster. For this feature, this paper proposed the concept of cluster to study the propagation of Bluetooth mobile phone virus. In the paper, the author analyzed the influence of the five parameters below to virus propagation in the clusters: coverage radius of Bluetooth signal, distribution density of mobile phones, the initial infection...
Through deeply analysis of INVITE flooding attack of SIP based VoIP system, a novel VoIP flooding detection scheme called CDVFD (Call Duration based VoIP Flooding Detection) is presented. The CDVFD method makes use of SIP signaling bidirectional interaction, and it can make fast detection using Chi-square value, and can distinguish from normal high VoIP traffic. Experimental results show the effectiveness...
A threat situation analytical method based on the network graph theory model was presented. In this method, the attack cost of adjacent nodes and the calculating formula for its effectiveness value were defined, as well as the method to calculate the maximum threat path and node. It analysis the threat level of the target node and the threat path of a local area network. The results indicated that:...
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. Currently speaking, we often imitate the properties of biological systems. Based on this thought, it also exists the analogous situation in the WSNs (wireless sensor networks). Survivability is the ability to provide essential services in the presence of attacks and failures, and recover full...
The existing researchers on security for sensor networks have mostly concerned about only reconfiguration or only rejuvenation or both mechanisms for adaptation of sensor networks. In this paper we employ self-regenerative software components in order to perform optimal software rejuvenation in wireless sensor network with a view to increase the availability of sensor nodes in sensor networks. Here,...
Mobile communication systems are increasingly used in companies. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such mobile communication systems. This work presents the experiences and results from the security analysis of a mobile system architecture at a large German telecommunications company, by making...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.