Reliability is one of the essential attributes of the dependable software, and an important factor for quantitatively characterizing software quality. Conventional methodology is Software Reliability Growth Model (SRG...
详细信息
Scalable Video Coding(SVC) provides flexible adaptation to bandwidth fluctuations and device capabilities. Thus to preserve such adaptation capabilities many layered access control emerge. In this paper, through analy...
详细信息
Trust model is the basis of the entire network security system. It determines the form of trust used in the network and the risk caused by the form. Furthermore, it provides the framework for establishing and managing...
详细信息
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public secur...
详细信息
ISBN:
(纸本)9780769542119
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain applications such as Internet Explorer or Adobe Reader, or incomplete security deployment. As such end users and network administrators have to cope with increasingly complicated network environments in order to ensure that they are under reasonably safe protection. However, the very nature of a network itself means making information accessible. As a matter of fact, networks are themselves designed to be "open". From a security point of view, the inherent nature of the network is insecure. Due to the complexity of the network nowadays, end users including home and business users have been aware of the importance of having a safer network environment and have taken action to protect themselves by applying the defences provided by computersecurity software & hardware vendors. Most of this just simply involves deploying off-the-shelf security applications and solutions such as firewalls, IDS, IPS, antivirus, anti-spam and so forth. Here users actually remain oblivious to their specific safety requirements, or they do not possess enough knowledge or sufficient resources to undertake appropriate requirement analysis. Such analysis also involves significant and untenable investment in terms of time, money and labour. Consequently the end result is often a much less safe network environment than required. It is important for end users to comprehend their specific safety requirement, and particularly to have access to an effective assessment of their current network security status so that they are able to proportionally apply the right security solutions needed to improve and enhance their network security. This paper introduces a stra
underwater wireless sensor networks are new arising research hotspot. The paper first analyses the related vector-based forwarding protocols for underwater wireless sensor networks, and puts forward a novel data forwa...
详细信息
Providing reliable multicast (RM) service in Ad Hoc networks is very challenging due to the significant packet losses. To improve the reliability, data packets can be cached at designated nodes for future possible ret...
详细信息
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Our research seeks to develop metrics that provide insig...
详细信息
We know that the statistical properties of random number generator with single chaos mapping have some shortcomings of unsatisfactory statistical performances. In this paper we propose a combined random number generat...
详细信息
In this paper, we present a fast biological data mining algorithm named IRTM based on embedded frequent subtree. We also advance a string encoding method for representing the trees, a scope-list for extending all subs...
详细信息
The paper presents that PROFIBUS-DP and CAN bus communication unit is developed. For drilling rig electric control system the communication unit achieves communication function between PLC and diesel generator control...
详细信息
暂无评论