information-Centric Networking(ICN) has recently emerged as a result of the increased demand to access contents regardless of their location in the network services. This new approach facilitates content distribution ...
详细信息
information-Centric Networking(ICN) has recently emerged as a result of the increased demand to access contents regardless of their location in the network services. This new approach facilitates content distribution as a service of the network with lower delay and higher security in comparison with the current IP network. Applying ICN in current IP infrastructure leads to major complexities. One approach to deploy ICN with less complexity is to integrate ICN with Software Defined Networking(SDN). The SDN controller manages the content distribution, caching, and routing based on the users' requests. In this paper, we extend these context by addressing the ICN topology management problem over the SDN network to achieve an improved user experience as well as network performance. In particular, a centralized controller is designed to construct and manage the ICN overlay. Experimental results indicate that this adopted topology management strategy achieves high performance, in terms of low failure in interest satisfaction and reduced download time compared to a plain ICN.
Various methods have been suggested for detecting injection vulnerabilities in web-based applications by now. However, some injection vulnerabilities are not only web-based but also occur in stand-alone applications, ...
Various methods have been suggested for detecting injection vulnerabilities in web-based applications by now. However, some injection vulnerabilities are not only web-based but also occur in stand-alone applications, i. e., SQL injection and OS command injection. Detecting the injection vulnerabilities in these applications is a challenge when their source code is not *** this paper, we present a smart fuzzing method for detecting SQL injection and OS command injection vulnerabilities in the executable codes of stand-alone applications. Our fuzzer employs the concolic(concrete + symbolic) execution method to calculate symbolic path constraints for each executed path in the executable code of the target program. Also, it calculates vulnerability constraints for each executed path to determine what input data makes the intended vulnerabilities active in that path. The calculated constraints are used to generate new test data that traverse as many execution paths as possible and detect the vulnerabilities in each executed path. We have implemented the proposed smart fuzzer as a plug-in for Valgrind *** implemented fuzzer is tested on different groups of test programs. The experiments demonstrate that our fuzzer detects the vulnerabilities in these programs accurately.
This paper introduces the design of the parallel connection of DC/DC power supplies. The topology of system configuration and performed modeling were stated. The problems such as the ripple electric current sharing of...
详细信息
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
Several different digital watermarking methods have been researched and proposed in the last ten years. However, most of the proposed methods focused on a single purpose. Recently, some multipurpose watermarking metho...
详细信息
This study investigates the effects of the spatial harmonics of magneto-motive force that appear in the air-gap of aluminum-cage induction motors, proposing some techniques for their mitigation. With respect to previo...
详细信息
This study investigates the effects of the spatial harmonics of magneto-motive force that appear in the air-gap of aluminum-cage induction motors, proposing some techniques for their mitigation. With respect to previous researches, special magnetic wedges to be mounted in the stator opening regions of semi-closed slots of existing motors are proposed, together with a special winding layout having a very low magnetomotive force harmonic content. Both 2D- and 3D-FEM numerical simulations have been carried out to quantify the problems and to understand the potential benefits of inserting the stator wedges. At the end, the mechanical feasibility of the proposed wedges is considered together with some attempts at implementation.
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for content owners and service providers. The Paper describes a secure (tampering-resistant) method for watermarking images for protection and authentication and digital media like audio, video, and multimedia data, and a combination of singular value decomposition (SVD) and Discrete wavelet transform (DWT) for insertion watermark by MATLAB to increase accuracy, simplicity, and flexibility Readability, secure robustness, and imperceptibility the visibility of the image. The proposed algorithm consists of three main steps: Firstly, we decomposed the original image into four sub-bands and the original watermark. Secondly, embed the watermark in the LL sub-band by replacing the singular value for the watermark. Finally, embed a watermark in the other three sub-bands by adding LL values for a watermark in each sub-band in the original image.
暂无评论