Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Software Defined Networking has become extremely hot both in academia and industry. Most of the SDN protocol is the OpenFlow protocol in the southbound interface. But bue to different manufacturers may have different understanding to the OpenFlow protocol and lead to the implementation may be different. So OpenFlow protocol conformance testing is becoming more important. This paper first introduces...
Experimental deployment of Cooperative Intelligent Transportation Systems have been undertaken these last years. But a real deployment is lower than expected. One reason is the lack of complete validation techniques which handle the whole system. The aim of this paper is to present a complete framework able to test each component involved in a C-ITS and which is able to check the interoperability...
The paper presents a methodology proposal for testing and evaluation of communication systems in Smart Grids, especially for Power Line Communication (PLC) systems. The PLC technology is widely used in power grid as a part of Advanced Metering Infrastructure (AMI) allowing mainly data transfers between a management system at utility and customer-premises smart meters. However, the PLC technology on...
The presented application aims to ease the testing process performed over the diagnostic services on CAN. With the help of automated tests, diagnostic service requests can be generated and, through the feedback from the ECU, one can determine the correlation between customer requirements and the current implementation. Using this application, the necessary time can be reduced from three days to half...
We introduce GenMatch, a novel set of techniques based on hardware synthesis, for achieving efficient and scalable privacy-preserving genetic testing. Processing and handling sensitive genome data require methodologies to thwart possible attacks and data theft scenarios. The GenMatch secure genome testing method utilizes Yao's Garbled Circuit (GC) protocol and creates a formulation of the matching...
CDNs are today the most scalable way of distributing content. Thanks to CDN interconnection even smaller operators can achieve global footprint. The main cost of this operation is the added latency because requests have to traverse multiple autonomous networks. The work in this article was able to quantify the real impact of this phenomenon and to point to its drawbacks and potential solutions.
Internet Protocol version 6 (IPv6) is a new routing protocol which has been deploying dramatically over the past years. This is introduced by IETF to overcome some of IPv4 limitations. People believe that IPv6 is secure more than IPv4, which this idea is not correct. IPv6 requires attention because of develop a secure and safe IPv6 deployment. It is important to know that it should be assessed regularly...
Web applications are used by companies across the world to deploy their products and services. Because of the technologies used to build web applications, they are by nature concurrent, for example, multiple users can have problems when accessing the same limited resources. The combination of the stateless nature of web applications and concurrent behavior creates unique challenges. Models have traditionally...
Paper presents a methodology and experimental measurements of communication performance in testing environment between virtual power plant (VPP) and remote terminal units (RTUs) that are normally installed at the distributed energy resources (DERs) for monitoring and control purposes. Experimental measurements were conducted during one-week testing period with VPP and two RTUs, placed in geographically...
Software Defined Networking (SDN) is the potential future backbone of all computer networking. The main advantage of SDN is that it separates the control plane from the data plane. This delegates switching/routing decisions to a controller that is connected to the switches. The connectivity of the switches and controllers can be represented as a network topology. Usually a network topology has to...
Recent developments in secure computation have led to significant improvementsin efficiency and functionality. These efforts created compilers that form thebackbone of practical secure computation research. Unfortunately, many of theartifacts that are being used to demonstrate new research for secure computationare incomplete, incorrect, or unstable, leading to demonstrably erroneousresults and inefficiencies...
Session Initiation Protocol (SIP) is a popularly used signaling protocol to manage connections between different user agents of a Voice over IP (VoIP) communication. SIP being a text based protocol is vulnerable to flooding, one of the popularly known Denial of Service (DoS) attacks. This attack can render VoIP servers unusable with depletion of CPU and memory resources. Given the accessibility of...
This paper addresses conformance testing of communication protocols. The Session Initiation Protocol (SIP) is often considered "the standard protocol" for deploying VoIP (Voice over IP) solutions. We implemented a popular SIP distributed scenario on an industrial test bed. Active testing of SIP maintains our attention, while we kept on experimenting with the test cases dependencies architecture...
The activities of triggering by the arrival of time are one of features for the time-triggered automotive control systems. To motivate this property, this paper presents an efficient approach for modeling and analyzing of the automotive control system using FOCUS schemes. In case of modeling, the FOCUS is used to develop a formal framework and model the individual component within the FlexRay communication...
Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about the performance of innovative environmental technologies can be verified by qualified third parties called "Verification Bodies". The "Statement of...
We provide a discussion of the Controller Area Network (CAN) networking protocol as used in space applications and then report the results of destructive and nondestructive single-event effects (SEE) testing of the Intersil ISL72027SEH CAN bus transceiver. We conclude with a brief discussion of 60Co total ionizing dose (TID) testing results.
Active exploitation of the previously proposed Set Top Box testing framework has given rise to new requirements such as remote monitoring of test execution. The system described in this paper is web-based and receives periodic updates of each registered test station, thus being a real-time web application. The system displays the video output of each tested device as an MJPEG stream. The large number...
Wireless Sensor Networks (WSNs) are already employed in numerous applications including military, industry, and health. Considering the inherent limitations in WSNs, the security is a critical issue in WSNs. The declared security functions of each device should be well verified. In this paper, a security testing method based on security level is proposed for WSNs. Meanwhile, an experimental security...
This paper outlines the development of symbolic modelling in white-box testing technology within the scope of an insertion modelling system (IMS). It implements the symbolic execution of the tested system and generate traces that contain a scenario of system behaviour. The obtained traces were checked for conformance with either a formal model for system specifications or a design model. This technique...
In order to solve the problems of test message being rejected by the network server running the network protocol, a novel method is proposed by introducing the genetic algorithm into the test message generation process. Firstly, under the calculation of distance matrix, alignment of protocol sequence and identification of packet format are accomplished. Secondly, the genetic algorithm is introduced,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.