The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without downloading the whole data. In 2012, Zhu et al. proposed the construction of an efficient PDP scheme for multicloud storage. They studied the existence of multiple CSPs to cooperatively store and maintain the clients' data. Then, based on homomorphic verifiable...
Concentration plant site selection is an complex system engineering. The traditional site selection schemes were too simple, only comparing on the technical and economic indicators of the schemes, but cross combinations between the various economic indicators were ignored. Through a comparative analysis of existing site selection method we explore the shortcomings of them, and then made extended time...
This paper studied the problems of parameter system construction for large-scale Internet of Thing situation assessment. It also states the research of situational awareness and assessment of IP network briefly, the situation assessment differences between Internet of Thing and IP network are dicussed, for some especial aspects and the significance about large-scale Internet of Thing situation assessment...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.