Self-organized service chain formed by service agent can't complete the scheduled collaborative target because of exceptions of service provider. This paper presents a service chain evolution model based on collab...
详细信息
This paper deploys active feedback control method for achieving generalized projective synchronization (GPS) of double-scroll chaotic systems, viz. identical Li systems (2009), and non-identical Lü-Chen system (2...
详细信息
As core and basic software of computer system, operating system takes control of all resources of computer and provides basis for applications developing. Data transfer and information sharing between different softwa...
详细信息
Utilization of Information technology (IT) in an enterprise, in addition to achieve benefit from the implementation of IT should come along with the risks (Information technology Risk) that may affect the achievement ...
详细信息
The Polish Grid Initiative commenced in 2009 as a part of the PL-Grid project funded under the framework of the Innovative Economy Operational Programme. The main purpose of this Project was to provide the Polish scie...
详细信息
In order to get better wheat pests outline, wheat pests image is segmented by variational level set method in this paper. This kind of level set function corrects the deviation between the level set function and the s...
详细信息
Recently, cloud computing is the fundamental change happening in the field of Information technology. In SaaS (software as a service) model, both applications software and databases will be deployed to the centralized...
详细信息
The proceedings contain 264 papers. The topics discussed include: simulation of traffic congestion at the tourist attraction spot of Kuching waterfront, Sarawak;hardware architecture of protection switching device (PS...
ISBN:
(纸本)9780769538921
The proceedings contain 264 papers. The topics discussed include: simulation of traffic congestion at the tourist attraction spot of Kuching waterfront, Sarawak;hardware architecture of protection switching device (PSD);intelligent route planning for multiple robots using particle swarm optimization;virtual mid-line detection on curve road for user guidance using simulation model;success factors for higher education ERPs;learning difficulties in programming courses: undergraduates' perspective and perception;combining fisheye with list: evaluating the learnability and user satisfaction;solution for string matching problem of Indian alphabetical letters;a new stability criterion of fuzzy systems with interval time-varying delay;analysis on the one-way communication capability of GPS satellites in orbit transmitting non-navigational information;and performance analysis in frequency-time-hopping multicarrier code-division multiple access systems.
The proceedings contain 264 papers. The topics discussed include: simulation of traffic congestion at the tourist attraction spot of Kuching waterfront, Sarawak;hardware architecture of protection switching device (PS...
ISBN:
(纸本)9780769538921
The proceedings contain 264 papers. The topics discussed include: simulation of traffic congestion at the tourist attraction spot of Kuching waterfront, Sarawak;hardware architecture of protection switching device (PSD);intelligent route planning for multiple robots using particle swarm optimization;virtual mid-line detection on curve road for user guidance using simulation model;success factors for higher education ERPs;learning difficulties in programming courses: undergraduates' perspective and perception;combining fisheye with list: evaluating the learnability and user satisfaction;solution for string matching problem of Indian alphabetical letters;a new stability criterion of fuzzy systems with interval time-varying delay;analysis on the one-way communication capability of GPS satellites in orbit transmitting non-navigational information;and performance analysis in frequency-time-hopping multicarrier code-division multiple access systems.
Botnet is an attack network composed of hundreds of millions of compromised computers. Botnet is emerging as the most serious threat against cyber-security and is used to launch Distributed Denial of Service (DDoS) at...
详细信息
ISBN:
(数字)9783642340383
ISBN:
(纸本)9783642340376
Botnet is an attack network composed of hundreds of millions of compromised computers. Botnet is emerging as the most serious threat against cyber-security and is used to launch Distributed Denial of Service (DDoS) attacks, malware dissemination, phishing, remote control, click fraud, and etc. Although botnet has posed serious security threat on Internet, the research of detecting and preventing botnet is still in its infancy. One effective technique for botnet detection is to identify botnet C&C traffic. In this paper, we present a case study of the IRC-based botnet C&C communication and then present a novel method to detect botnet C&C communications. We develop quantitative ways to assess the C&C communications between the bot and the C&C server;furthermore, we also illustrate the correlation methods within the same botnet's C&C communications to decrease the false positive rate.
暂无评论