The security level of networks and systems is determined by the software vulnerabilities of its elements. Defending against large scale attacks requires a quantitative understanding of the vulnerability lifecycle. Spe...
详细信息
ISBN:
(纸本)1595935711
The security level of networks and systems is determined by the software vulnerabilities of its elements. Defending against large scale attacks requires a quantitative understanding of the vulnerability lifecycle. Specifically, one has to understand how exploitation and remediation of vulnerabilities, as well as the distribution of information thereof is handled by *** this paper, we examine how vulnerabilities are handled in large-scale, analyzing more than 80,000 security advisories published since 1995. Based on this information, we quantify the performance of the security industry as a whole. We discover trends and discuss their implications. We quantify the gap between exploit and patch availability and provide an analytical representation of our data which lays the foundation for further analysis and risk management. Copyright 2006 ACM.
In the context of low-power wireless sensor networks, this paper presents multi-hop network tomography (MNT), a novel, non-intrusive algorithm for reconstructing the path, the per-hop arrival order, and the per-hop ar...
详细信息
We propose a novel method for mitigating erroneous wake-ups that are commonly associated with ultra-low power wake-up receivers. Recent research in low-power protocols has demonstrated significant improvements in ener...
详细信息
As one of Qo S(Quality of Service) metrics, delay is critical important to delay sensitive applications, such as interactive video, network game and online surgery. In this paper, we exploit SDN(Software Defined Netwo...
详细信息
As one of Qo S(Quality of Service) metrics, delay is critical important to delay sensitive applications, such as interactive video, network game and online surgery. In this paper, we exploit SDN(Software Defined Networking) advantages to solve delay Qo S problem. Our work mainly focuses on SDN based queuing delay estimation with real traffic and end-to-end delay control. First, we propose a queuing estimation model and extended it for end-to-end delay of the whole path. It is proved to be feasible and accurate with experimental results in SDN environment. Second, in order to demonstrate the use of our proposed model, we also implement an end-to-end delay control application in SDN. It fulfills specific delay Qo S requirements by dynamically switching flows to a suitable queue based on estimation results and delay requirements.
Recent advances in communication and networking technologies are leading to a plethora of novel wireless services that range from unmanned aerial vehicle(UAV)communication to smart cognitive networks and massive Inter...
详细信息
Recent advances in communication and networking technologies are leading to a plethora of novel wireless services that range from unmanned aerial vehicle(UAV)communication to smart cognitive networks and massive Internet of Things(IoT)*** these emerging applications over the fifth generation(5G)of wireless cellular systems requires meeting numerous challenges pertaining to spectrum sharing and *** fact,most 5G applications will be highly reliant on intelligent spectrum management techniques,which should adapt to dynamic network environments while also guaranteeing high reliability and high quality-of-experience(QoE).
The emerging intelligence technologies represented by deep learning have broadened their applications to various fields. Beyond the conventional electronics-based processing systems, the convergence of photonics and a...
详细信息
The emerging intelligence technologies represented by deep learning have broadened their applications to various fields. Beyond the conventional electronics-based processing systems, the convergence of photonics and artificial intelligence(AI) technology enhances the performance and learning ability of AI. In this review, we propose the concept of an intelligent photonic system(IPS), illustrating it as a developing architecture with three different versions. For each version of IPS, we review several representative *** we discuss the challenges towards an IPS and provide some prospects for the future development.
One of the most attractive systems for scalable quantum processing is the trapped atom in the optical cavity, which is easily manipulable with lasers. The qubit cavity system represents an attractive structure for qua...
详细信息
One of the most attractive systems for scalable quantum processing is the trapped atom in the optical cavity, which is easily manipulable with lasers. The qubit cavity system represents an attractive structure for quantum optics, with possibilities for applications in quantum detecting, quantum computation, and quantum communication. In addition, the investigation of the cavity-atom system under temperature is a fundamental concept in quantum optics and quantum information science. Here we continue in this quantum way, investigating different qubit(s)-cavity systems (where we increase the numbers of the qubit inside the optical cavity from one to four). Using the Dicke model, we calculate the probability of occupation of the ground state of the cavity 〈aˆ†aˆ〉 and the expectation values 〈Jz〉 for each system. We find that these probabilities increase as the coupling strength Cs increases. This leads to reaching the ultra-strong coupling regime, which depends on the number of qubits. To describe the quantum state, we examine the cavity Wigner function WF as a function of the coupling strength Cs. Under the same parameters (e.g. Cs and the dissipation rates), we find that the separation of the quantum state in the WFs representation is different from one system to another. Furthermore, since understanding these kinds of systems is very important in order to improve the quantum network system, we study the entropy S of the subsystems (such as S of qubit) in each system. Also, we move beyond by studying the effect of the temperature on the Fock-state distribution occupation probability and entropy of the subsystems. Our results present another step to understanding the qubit(s)-cavity interaction to improve the performance of future quantum networks based on this system. Where the interplay between temperature, coupling strengths, and the Fock-state occupation probabilities contributes significantly to the understandi
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor networks (WSN), secure multi-party computation ...
详细信息
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks.
Energy-efficient and power-aware designs have played important roles in modern computing systems to reduce the power bills for server systems or prolong the lifetime of embedded devices. Moreover, systems with multipl...
详细信息
Designing and testing low-power wireless communication protocols often requires experimental deployments on real hardware in realistic settings. Infrastructure testbeds have the advantage that they allow reproducible ...
详细信息
暂无评论