An agent-based framework for the impact analysis of faults and attacks in large-scale networks is discussed. The framework is used to discover attack points and to examine the behavior of critical network components d...
详细信息
An agent-based framework for the impact analysis of faults and attacks in large-scale networks is discussed. The framework is used to discover attack points and to examine the behavior of critical network components during an attack or system fault. The two common types of attacks are server attacks such as TCP SYN, and ICMP flood, and routing attacks, such as distributed denial-of-service (DDoS) attacks. In network attacks, attackers overwhelm the target system with a continuous flood of traffic designed to consume all system resources. The framework analyze the impact of multiple failures on overall system behavior and identify critical resources and vulnerabilities.
Bluetooth is a promising short-range radio technology for wireless personal area networks. There is an interest to expand the coverage of such networks by interconnecting them to form scatternets. Most of the scattern...
详细信息
Distance learning programs use on-line video records to deliver pre-recorded lectures. And, video communication systems can be used as a discussion tool. In this paper, we start our discussion on a multimedia presenta...
详细信息
Distance learning programs use on-line video records to deliver pre-recorded lectures. And, video communication systems can be used as a discussion tool. In this paper, we start our discussion on a multimedia presentation recording system which we had developed. We then present how the video recording concept can be further extended to realize an augmented video conferencing system, which can be used as a peer-to-peer discussion tool, as well as a lecture broadcasting system. We also point out that an object tracking technology can be further integrated to enhance the tool, to enable a more realistic and useful system for the discussion in distance education.
Distance learning programs use on-line video records to deliver pre-recorded lectures. And, video communication systems can be used as a discussion tool. In this paper, we start our discussion on a multimedia presenta...
详细信息
The important arithmetic operations over finite fields include exponentiation, division, and inversion. An exponentiation operation can be implemented using a series of squaring and multiplication operations over GF(2...
详细信息
Wireless mobile computing devices are used extensively to access the Internet for critical applications and services, which must be secured by computationally efficient algorithms and schemes. Computationally efficien...
详细信息
We previously developed a framework, Hydra, for adding formal semantics to a collection of UML diagrams that enable the automated derivation of formal language specifications for those diagrams. Recently, we have also...
详细信息
Real-time systems are an important class of process control systems that need to respond to events under time constraints, or deadlines. Such systems may also be required to deliver service in spite of hardware or sof...
详细信息
In this paper, we exploit a prioritized-service architecture and apply a priority based traffic control scheme to reduce abusive Internet access, improve fairness among users and study users behavior under a prioritiz...
详细信息
暂无评论