Dynamic Adaptive Streaming over HTTP (DASH) is a widely adopted video streaming protocol. Adaptive Bitrate Streaming (ABR) algorithm is utilized to dynamically switch between different bitrates. However, traditional A...
详细信息
Emerging applications in healthcare, autonomous vehicles, and wearable assistance require interactive and low-latency data analysis services. Unfortunately, cloud-centric architectures cannot fulfill the low-latency d...
详细信息
The increasing demand for real-time data analysis in Internet of Things (IoT) ecosystems has created several challenges, particularly in environments where resources are limited, and minimizing data processing latency...
详细信息
This article explored a high interaction deception defense mechanism based on RASP (runtime application self-protection) technology and its application in network attack tracing. Traditional network security defense m...
详细信息
ISBN:
(纸本)9798350389913;9798350389906
This article explored a high interaction deception defense mechanism based on RASP (runtime application self-protection) technology and its application in network attack tracing. Traditional network security defense methods face some limitations, such as insufficient detection of complex attack patterns and difficult traceability. The purpose of this study was to enhance defense capabilities and improve the tracking efficiency of attack sources by integrating RASP technology and high interaction deception strategies. The experimental study demonstrated the potential of this comprehensive method in real-time attack detection, response, and traceability, and its effectiveness was verified through experiments. This study comprehensively evaluated the performance of a high interaction deception defense and traceability system based on RASP technology through three experiments during the research phase. In the first experiment, defense effectiveness tests against SQL (structured query language) injection, XSS (cross site scripting), and DDoS (distributed denial of service) attacks showed that the system exhibited high detection rates of 95%, 90%, and 92%, respectively, with response times of 0.3 seconds, 0.5 seconds, and 0.4 seconds, and false alarm rates maintained at a low level of 2%-4%. In the second experiment, the evaluation of interaction effects on different types of honeypots showed that high interaction honeypots were the most effective in attracting attackers, with an average dwell time of 30 minutes and 10 interaction operations, far exceeding other types of honeypots. Finally, the accuracy and speed testing of traceability revealed the traceability ability of the system under different types of attacks. Among them, the traceability accuracy of malicious software attacks was the highest, reaching 95%, but the longest required time was 50 seconds;the traceability accuracy of fishing attacks was 85%, taking 45 seconds. The above data conclusions collectively de
Understanding the performance behavior of parallel applications is important in many ways, but doing so is not easy. Most open source analysis tools are written for the command line. We are building on these proven to...
详细信息
ISBN:
(纸本)9798350364613;9798350364606
Understanding the performance behavior of parallel applications is important in many ways, but doing so is not easy. Most open source analysis tools are written for the command line. We are building on these proven tools to provide an interactive performance analysis experience within Jupyter Notebooks when developing parallel code with MPI, OpenMP, or both. Our solution makes it possible to measure the execution time, perform profiling and tracing, and visualize the results within the notebooks. For ease of use, it provides both a graphical JupyterLab extension and a C++ API. The JupyterLab extension shows a dialog where the user can select the type of analysis and its parameters. Internally, this tool uses Score -P, Scalasca, and Cube to generate profiling and tracing data. This tight integration gives students easy access to profiling tools and helps them better understand concepts such as benchmarking, scalability and performance bottlenecks. In addition to the technical development, the article presents hands-on exercises from our well-established parallel programming course. We conclude with a qualitative and quantitative evaluation with 19 students, which shows a positive effect of the tools on the students' perceived competence.
This article proposes a method for detecting the distance between power transformer bushings based on binocular stereo vision, which utilizes the Grabcut image segmentation algorithm to achieve intelligent segmentatio...
详细信息
Federated self-supervised learning (FedSSL) is an emerging method in the domain of machine learning. It collaboratively learns a powerful feature extractor among multiple participants by utilizing distributed unlabele...
详细信息
Load unbalancing problem has a significant impact on the parallel efficiency of fluid-structure interaction simulation in cavitating flow. When the total parallelism is determined, the speedup will be seriously affect...
详细信息
The fine-grained calculation method of accepting distributed generation capacity in distribution network for virtual power plant is proposed in this paper. Firstly, a distributed generation capacity model including ph...
详细信息
In the practical application of electromagnetic transient real-time simulation computing platform, due to the large amount of calculation and long calculation time of electromagnetic transient simulation calculation, ...
详细信息
暂无评论