Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
The following topics are dealt with: mobile computing; wireless sensor networks; cloud computing; grid, computing; data center computing; cluster computing; energy-aware applications; virtualization; multicore computing; computer architecture; distributed computing; computer networks; network architecture; CPS security; CPS computing; social networking; Internet of things; WISARN I and embedded system...
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
Distributed Denial of Service (DDoS) attacks on the Internet are used by attackers to be a nuisance, make a political statement (e.g. the 2009 attack against Estonia), or as a weapon of an Internet extortionist. Effective defense against these is a crucial study area, where advanced simulation techniques play a critical role, because of the enormous number of events involved. This paper considers...
Nowadays, there is a significant lack of generic application frameworks providing third party developers with the appropriate mechanisms for building ubiquitous context-aware healthcare applications over medical heterogeneous networks. In this paper, we propose a new framework integrating context-aware and security mechanisms with mechanisms that allow the ease exploitation of the core networks' functionality...
The following topics are dealt with: broadband, wireless computing, communication and applications; ad hoc networks; sensor networks; parallel and multi-core systems; mesh networks; practical security and privacy application; optical networks; networks algorithms and protocols; distributed schemes and protocols; wireless networks; disaster information systems; network security, privacy and trust;...
The following topics are dealt with: artificial intelligence; computer networks; computer systems modelling and simulation; computer vision; image processing; video processing; digital communication; information security; software engineering; HCI and wireless networks.
In article questions of detection of the distributed attacks in computer networks by means of artificial neural networks are considered. And also approximation of functions in space of quantitative signs is resulted.
The following topics are dealt with: parallel processing; distributed processing; operating systems; middleware; scheduling; load balancing; computer networks; multiprocessing systems; mobile computing; pervasive computing; software development; Web services; wireless networks; data security; and cloud computing.
This study was on the computer network layer and application layer data packet interception, analysis, analysis of network data flow filter, protocol decoding, multi-node collaborative detection, anomaly feature extraction, pattern discovery algorithms, intrusion detection model, network-level intrusion detection The algorithm and protocol analysis test method and so on, trying to find fast and efficient...
The paper deals with the following topics: algorithms; artificial intelligence; bioinformatics; geoinformatics; communication networks; computer architecture; VLSI; computer security; data mining; databases; distributed systems; financial systems; health informatics; image processing; information science; intelligent control systems; Internet; e-commerce; knowledge creation; middleware; mobile computing;...
The effect of advances in the fields of ubiquitous computing, wireless communications and embedded system design has seen a corresponding rapid improvement of wireless sensor technology. Sensor networks have emerged as a platform for deployment and sustenance of critical applications that require real-time sensing and data acquisition for decision-making purposes. A significant number of malicious...
Since automated fault localization can improve the efficiency of both the testing and debugging process, it comes to an indispensable part of high security and reliable software development for the computer networks. A novel software fault localization framework: Variable Stress Reaction (VSR) is proposed in this paper, which works well for data type overflow detection. The experimental results show...
The use of computer networks to transmit medical information is faced to data security problems. Hence it is necessary to make these data unreadable and indecipherable during their transfer. The encryption and decryption of medical images are performed either by software or hardware. A software implementation has the advantage of being portable and low cost but its drawback is the slowness decryption...
The implementation of cyber threat countermeasures requires identification of points in a system where redundancy or other modifications are needed. Because large systems have many possible threats that may be interdependent, it is crucial that such threats be cataloged in a manner that allows for efficient representation and ease of analysis to identify the most critical threats. To address this...
Based on the analysis of the characteristics in the E-Commerce system and safety risk, the author has focused on the Fuzzy-ETA (event tree analyse)-FTA(fault tree analyse) method applied in the process risk management of R&D projects. The author has analyzed the possibility of an integration of EAT-FAT, and solved the problems in the integration of The Gray Synthetic Evaluation Theory by applying...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.