Medication guide ontology has great significance for semantic study of rational use of drugs. Nowadays, medical ontology is mainly constructed manually, which spends a lot in time and manpower, and is also difficult t...
详细信息
In the cloud computing environment, most of applications rely on the network access to achieve their functionalities. Untrusted or vulnerable cloud applications will incur unauthorized network accesses which may bring...
详细信息
In the cloud computing environment, most of applications rely on the network access to achieve their functionalities. Untrusted or vulnerable cloud applications will incur unauthorized network accesses which may bring on the user information leakage or other threats. In this paper, we propose a novel feather-weight hardware-assisted hypervisor, namely NFVisor (Network Filter Hypervisor), to thwart such unauthorized network accesses. Compared to previous host-based approaches, NFVisor offers two distinct advantages: preinstalled commodity OS compatibility and non-by passable manipulation of network accesses. Unlike typical hypervisors, deploying NFVisor does not require OS reinstallation. By intercepting the low-level interactions between the OS and the hardware, NFVisor can manipulate the network accesses at the hypervisor layer instead of the OS layer, which is subvertable for the privileged malware. Our functionality evaluation shows NFVisor can impede unauthorized network connections effectively while the performance evaluation shows desktop-oriented workloads achieve 94.12% of native speed on average.
A barrier certificate is an inductive invariant function which can be used for the safety verification of a hybrid system. Safety verification based on barrier certificate has the benefit of avoiding explicit computat...
详细信息
User profiling plays an important role in online news recommendation systems. In this paper, we analyze the relationship between users' clicking behaviors and the category of the news story to model user's int...
详细信息
The study provides a design scheme for the mountain landslide monitoring system based on wireless sensor networks. Different sensors are mainly used to collect data about the water depth in the soil and the sloping an...
详细信息
OFDM is promising for underwater acoustic (UWA) communications due to its potential to combat the large delay spread. However, the performance of the OFDM system is seriously deteriorated by the inter-carrier interfer...
详细信息
ISBN:
(纸本)9781479982981
OFDM is promising for underwater acoustic (UWA) communications due to its potential to combat the large delay spread. However, the performance of the OFDM system is seriously deteriorated by the inter-carrier interference (ICI) caused by the transmitter/receiver motion and ocean waves. In this paper, we propose a novel ICI countermeasure. The key idea is to inactivate partial subcarriers according to index modulation and meanwhile transmit signals with opposite polarity on two adjacent active subcarriers for ICI self cancellation. Simulation results validate that the proposed scheme achieves much better bit error rate (BER) performance than many existing schemes in UWA communications.
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl...
详细信息
State keylaboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ...
详细信息
Steganography software detection is one of effective approaches for steganography forensics using software analysis. In this paper a method of LSB replacement steganography software detection is proposed. Firstly thre...
详细信息
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computi...
详细信息
暂无评论