The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 21st century will be the century of knowledge, and then knowledge management plays an increasingly important role in economic life. Knowledge Management-Oriented OA (Office Automation), whose connotation and extension have entirely changed, breaks through traditional limitations caused by Official Document-Oriented OA. Keeping an eye on the latest IT application technology, we will research the...
As a promising technology to improve network survivability, reliability and flexibility, autonomous reconfigurability is extremely important for modern information networks that usually respond to unforeseen events. In this paper, we mainly focus on autonomously reconfigurable network systems from the point of emergency response. Based on the features of reconfigurable network systems, we propose...
Three wastes fluidized mix combustion furnace is significant for improving enterprise production efficiency, energy-saving design can make the total wastes caused in the gasification process to be recovered and reused. This paper introduces how to choose three wastes fluidized mix combustion furnace,the core progress of production and the running conditions in details. new energy-saving design, solving...
With the prosperity of E-commerce industry, the electronic commerce course construction also needs developing synchronously. E-commerce security is the important part of e-commerce, and is also a course which combines theory with practice closely. To improve the practical operative ability, a perfect teaching experiment platform is necessary for students to do the e-commerce security-related experiments...
A Home Network, or Customer Premises Network (CPN), is a special case of a local area network. It is used for communication between a small number of devices deployed within a home or a small office: computers and printers, Set-Top Boxes, IP-phones and other connectivity gears (e.g. wireless access points). The key element of the CPN is its interconnection, through a (ultra) broadband provider, to...
Computational grids have been at the forefront of e-science supercomputing for several years now. Many issues have been settled over the years, but some may only appear to be so. One of these issues is firewall traversal. Many solutions have been proposed and developed. We have developed two such solutions ourselves: Remus and Romulus, but like all other solutions, they are limited in application...
Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new developments in multifactor authentication, advances in malware protection and many more. During a similar period of time the industry has seen the need for network infrastructure which...
Homograph attacks are a very common type of security vulnerability on the Web. The attack aims to hide the domain name origin by switching some letters in the URL. As the Web evolves beyond the traditional base of English-speaking users, this kind of threat will increase significantly with the use of non-Latin scripts in the entire domain name. The recent introduction of Internationalized Domain Names...
The vulnerability analysis based on rule is playing an important role in the internet security. Many security devices such as firewalls and intrusion detection systems work on the packet filtering system of which rules are the bases. The consistency of the rules and security policies as well as the validity of the regulation configure are of importance. Thus we must check and find out the rule’s anomaly...
To resolve the question: penetrate firewall and accurately identify the remote host operating system, research deeply on the ARP protocol and the TCP/IP protocol stack, provide a mothed about host detection through firewall, describes the TCP port scanning process, design a fingerprint storehouse, TCP bag first part and operating system detecting process, develop the network security assessment system...
After over forty years' development in an extraordinary speed, the Internet is confronting profoundly different social and economic environments, with the continuously increasing users demands. However, the essence and key designs of the current Internet have remained untouched during the past decades. Over the same years, Internet users have been calling for a better Internet that features significantly...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defender or Intruder-Administrator in simulated cyber warfare. Given a network environment, attack graphs are defined in an anticipation game framework to generate action strategies by analyzing (local/global) vulnerabilities and security measures. The proposed approach extends an anticipation game (AG)...
With the rapid development of Internet, more and more web applications based on database appeared, thus the databases face the threats. Because of the SQL attacks, people pay much attention to the security of database on the internet. This paper presents a solution that is a database security gateway deployed between web server and database server. The paper describes the architecture of the database...
Under the network environment, security of library information system(LISS) is an important topic for all managers. This paper analyzes main categories of security of library information system and puts forward efficient means of protecting this system. The paper finally points out the significance of security of library information system.
We interpret “mission assurance” to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures and other accidental or maliciously induced changes in the system or its operating environment. MEF can be threatened when the Quality of Service (QoS) delivered by the information system drops below useful levels, when the security...
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain applications such as Internet Explorer or Adobe Reader, or...
Since the aging population increasing and the acceleration of the life pace, more intelligent robots have been developed for health monitoring and home security. In this paper, we proposed a framework of indoor security information interactive system basing on Internet and GSM/GPRS hybrid network. On hardware, the system consists of several sub-systems: industrial computer, GSM/GPRS module, ultrasonic...
As a grassroots organization, community is the basis for various types of disasters risk control. Based on the investigation and analysis of the common classification of disaster risk and the control way, the article focus on the communities' role and task in disaster risk management system, and then discuss the effective ways by which you can provide appropriate assistance for disaster risk management...
High-rise building has greater risk of fire according to its features such as great height, complex structure and diverse functions and so on. It's easy to cause heavy casualties and property losses once the high-rise building fire taking place. It's of great significance, through the fire-safety evaluation for high-rise building, to prevent the occurrence of high-rise building fire in time. For the...
Urgent logistics is a complicated system, and the support capability evaluation for urgent logistics have a large number of attributes or aspects. The analytical hierarchy process (AHP) is a simple and effective way for multi-criterion and multi-objective analysis in system analysis and system assessment. In this paper, the meaning of urgent logistics and the general principle of AHP are first introduced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.