In recent years, many scholars and experts have discovered that mobile communication systems and techniques are susceptible to a wide range of cyberattacks. These assaults not only inflict pain and damage to private f...
详细信息
In this paper we describe a heavily constrained university timetabling problem, and our genetic algorithm based approach to solve it. A problem- specific chromosome representation and knowledge-augmented genetic opera...
详细信息
AORTA has been proposed as an implementable real-time algebra for concurrent systems where event times, rather than values of data, are critical. In this paper we discuss an extension to AORTA to include a formal data...
详细信息
ISBN:
(纸本)3540643036
AORTA has been proposed as an implementable real-time algebra for concurrent systems where event times, rather than values of data, are critical. In this paper we discuss an extension to AORTA to include a formal data model, allowing integration with a variety of model-based data specification languages. An example is given using VDM with AORTA to define a time-critical system with important data attributes, and supporting software tools for AORTA and a simple imperative language are described.
The proceedings contain 21 papers. The special focus in this conference is on Principles of Security and Trust. The topics include: Symbolic and computational models;four nodes topologies are sufficient;parametric ver...
ISBN:
(纸本)9783642286407
The proceedings contain 21 papers. The special focus in this conference is on Principles of Security and Trust. The topics include: Symbolic and computational models;four nodes topologies are sufficient;parametric verification of address space separation;verification of security protocols with lists;privacy supporting cloud computing;a formal analysis of the norwegian e-voting protocol;security proof with dishonest keys;reduction of equational theories for verification of trace equivalence;towards unconditional soundness;verified indifferentiable hashing into elliptic curves;provable de-anonymization of large datasets with sparse dimensions;revisiting botnet models and their implications for takedown strategies;a game-theoretic analysis of cooperation in anonymity networks;deciding selective declassification of petri nets;enforceable security policies revisited;towards incrementalization of holistic hyperproperties;a certificate infrastructure for machine-checked proofs of conditional information flow;a language for attribute-based access control in open systems and a core calculus for provenance.
Solar panels are frequently used in wireless sensor nodes because they can theoretically provide quite a bit of harvested energy. However, they are not a reliable, consistent source of energy because of the Sun's ...
详细信息
It aims to inspire domestic and foreign alumni to participate in the construction of the Second Centenary National Demonstration Zone of the Communist Party of China by reviewing the cognitive computing and system ana...
详细信息
The proceedings contain 18 papers. The special focus in this conference is on Decision and Game theory for Security. The topics include: A localization game in wireless sensor networks;effective multimodel anomaly det...
ISBN:
(纸本)9783642171963
The proceedings contain 18 papers. The special focus in this conference is on Decision and Game theory for Security. The topics include: A localization game in wireless sensor networks;effective multimodel anomaly detection using cooperative negotiation;the password game: Negative externalities from weak password practices;towards a game theoretic authorisation model;disperse or unite? A mathematical model of coordinated attack;uncertainty in interdependent security games;attack–defense trees and two-player binary zero-sum extensive form games are equivalent;methods and algorithms for infinite bayesian stackelberg security games;optimal information security investment with penetration testing;tracking games in mobile networks;gPath: A game-theoretic path selection algorithm to protect tor’s anonymity;when do firms invest in privacy-preserving technologies?;adversarial control in a delay tolerant network;security interdependencies for networked control systems with identical agents;robust control in sparse mobile ad-hoc networks;a game-theoretical approach for finding optimal strategies in a botnet defense model.
In engineering, the process of a dynamic system is formulated by a set of continuous variables and a set of discrete states and failure can be seen as the unexpected state in the process. Moreover, the discrete events...
详细信息
ISBN:
(纸本)9781467385572
In engineering, the process of a dynamic system is formulated by a set of continuous variables and a set of discrete states and failure can be seen as the unexpected state in the process. Moreover, the discrete events and the continuous variables influence each other while the dynamic system is processing. On the other hand, the distributions of some system's parameters are hardly to obtain and it is also time-consumed to simulate the model even if the distribution is obtained due to the traditional sampling algorithms. These problems bring great difficulties in reliability modeling and analysis. In this paper, a method of non-probabilistic reliability modeling and analysis based on hybrid theory and interval analysis is proposed to solve the problems described above. Hybrid theory, which is proposed to solve the interaction between continuous and discrete and mainly applied in the field of control and computer, is utilized to build the reliability and performance integrated model. Interval analysis is utilized to describe the uncertainties. Combining with the advantages of hybrid theory and interval analysis, the method can be used to verify the reliability of system which is influenced by its continuous variable and discrete state. When the bounds on the uncertain information can be obtained readily, the method is particularly useful.
Object detection plays an important role in intelligent transportation systems, especially due to the rise of autonomous vehicles and smart traffic management. Although object detection techniques in traffic scenes ha...
详细信息
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing schem...
详细信息
ISBN:
(纸本)9780769549507;9781467356459
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing scheme. We propose a greedy embedding algorithm, which is used to realize efficient routing and content addressing for darknets. The embedding guarantees success of greedy routing using compact address representations. Evaluation on trust graphs obtained from PGP's web of trust shows that our embedding enables much more efficient routing than existing darknet embeddings. Though, content addressing based on the embedding exhibits unbalanced load.
暂无评论