With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
Trusted computing and chain of trust are the very mechanisms to solve the security problems of informationsystem. A chain of trust is established by validating each component of hardware and software from the bottom ...
详细信息
Hot trace building plays an important role in enhancing the performance of dynamic binary translators, since in most cases 10% of code takes 90% of execution time of the whole program. Hot traces can promote the code ...
详细信息
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis...
详细信息
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace can be restored and the more comprehensive attack scenario description information will be generated using this technology. This working lets the security manager more comfy. The state machine based attack scenario reconstruction technology processes security events using clustering analysis and causal analysis concurrently, it builds a correlation state machine in memory for every attack scenario tree which is predefined by the security manager, when security events are coming, the certain state machines will process them, if the condition is satisfied, an attack scenario description information will be generated and then sent to the security manager. The correlating technology based on state machine is more timely and accurately, and at last, we use the DARPA2000 Intrusion Scenario Specific Data Sets to validate the technology, the experiment results show that it is feasible to analyze security events using the technology we proposed.
Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasibl...
详细信息
In recent years, dynamics model and control of space robot system are the hot topics in the research field. In this paper, a new dynamics model and control strategy of space robotic system with a flexible manipulator ...
详细信息
In recent years, dynamics model and control of space robot system are the hot topics in the research field. In this paper, a new dynamics model and control strategy of space robotic system with a flexible manipulator and a liquid fuel tank are investigated. Based on Lagrange equation method, the dynamics model of the space robotic system coupling with liquid sloshing, flexibility vibration and base movement is derived. The elastic deflection of the flexible manipulator is described by the assumed mode method and equivalent mechanical model is adopted instead of liquid sloshing under the environment of low-gravity. The inverse dynamics control algorithm combined with PD control method is performed to solve the trajectory tracking problem. Some simulation results are given to verify the effectiveness of the proposed method.
Because of strong coupling, nonlinear, and time-varying characteristics, it is difficult to control complex spacecraft. By means of combining with controlled object dynamics and performance requirements, characteristi...
详细信息
Because of strong coupling, nonlinear, and time-varying characteristics, it is difficult to control complex spacecraft. By means of combining with controlled object dynamics and performance requirements, characteristic modeling and control approach is an effective way to solve this problem. Aimed at the flexible satellites described by using characteristic modeling approach, with the help of fuzzy rules, fuzzy dynamic characteristic modeling method and intelligent adaptive controller are designed to control this complex spacecraft. Meanwhile, based on the satellite system simulation platform, we validate the correctness and efficiency of the proposed modeling and control method by comparing with the simulation results of the other similar methods.
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible...
详细信息
ISBN:
(纸本)9781424472598;9780769540726
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible cases that their algorithm cannot handle, we propose an extension method to manipulate the transition between sharp and rounded features. The algorithm first patches n crescent-shaped extended surfaces to the boundary with G 2 continuity to handle incompatibility problem in the corners. Then, we compute the inner curves and the corresponding cross-boundary derivatives fulfilling tangent and twist compatibilities. The generated B-spline Coons patches are G 1 -continuously connected exactly, and have ε-G 1 continuity with the extended surfaces. Our method improves the continuity-quality of the shape and reduces the count of the inserted knots. It can be applied to all G 0 -continuous boundary conditions without any restrictions imposed on the boundary or cross-boundary derivatives. It generates better shapes than some popular industrial modeling systems on these incompatible occasions. Some examples underline its feasibility.
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. ...
详细信息
ISBN:
(纸本)9781424472611;9780769540597
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. The purpose of this work is to design secure linear network coding against wiretap attack. The problem is to maximize the transmission data rate of multiple unicast streams between a pair of source and destination nodes, under the condition of satisfying the weakly secure requirements. Different from most existing research on network coding that designs the network coding scheme based on a given network topology, we will consider the integrated network topology design and network coding design. Such an integrated approach has not been reported by other researchers. In this paper, we formally introduce the problem, prove the problem is computational intractable, and then develop efficient heuristic algorithms. We first try to find the transmission topology that is suitable for network coding. Based on the topology, we design linear network coding scheme that is weakly secure. We conduct simulations to show that the proposed algorithms can achieve good performance.
暂无评论