In electrical power systems, the coordination of protections in time domain is important and difficult problem. The time settings of protection relays have to be adapted to the time characteristics of electrical power...
详细信息
In electrical power systems, the coordination of protections in time domain is important and difficult problem. The time settings of protection relays have to be adapted to the time characteristics of electrical power system plants and the delay times of the other protections. In the paper, Fault Trees with Time Dependencies (FTTDs) are used in selection of values of the delay times of primary (local) and remote backup protections. In the FTTD, events and gates are characterized by time parameters. These time parameters are derived from the time characteristics of protection devices and the inherent delay times of protection equipment.
This paper juxtaposes performance of the grammar- based classifier system (GCS) with tabular representation algorithm (TBL) on the task of inducing context-free grammars from partially structured examples. In both cas...
详细信息
This paper juxtaposes performance of the grammar- based classifier system (GCS) with tabular representation algorithm (TBL) on the task of inducing context-free grammars from partially structured examples. In both cases structured examples rapidly improve the efficiency of learning algorithms, although there are substantial differences in the way they work. GCS requires more attention while setting initial system parameters and structured examples provide a bit more information than in TBL but on the other hand it is more efficient when tested against the same examples' sets.
It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in ca...
详细信息
It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in case of cryptographic devices, such as smart cards or crypto-processors, errors may also leak some secret information hidden in the device (e.g. encryption keys). This was presented for almost all cryptographic protocols and algorithms allowing an adversary to perform a fault analysis. Therefore it is urgent to propose hardware implementation of cryptographic algorithms that will be immune to this type of attack. Some solutions to this problem have been already proposed for the RSA algorithm based on the Chinese Reminder Theorem and for symmetric algorithms. On the other hand there is a large number of algorithms that are susceptible to fault analysis but no solutions to increase immunity have been proposed so far.
A method of reliability and functional analysis related to discrete transport systems is presented. The proposed analysis is based on modeling and simulating of the system behavior. Monte Carlo simulation is used for ...
详细信息
A method of reliability and functional analysis related to discrete transport systems is presented. The proposed analysis is based on modeling and simulating of the system behavior. Monte Carlo simulation is used for proper reliability and functional parameters calculation. The simulator is built using Scalable Simulation Framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling. The authors stress the problem of influence of the reliability parameters for final system functional measures (required time of delivery). They also propose to measure the economic quality of discrete transport system by "profit function". The presented problem is practically essential for defining an organization of vehicle maintenance and transport system logistics.
The paper presents the model of automatic detection system which uses fuzzy logic methodology for intrusion detection and analysis in sophisticated distributed system. The proposed system functions are to detect the o...
详细信息
The paper presents the model of automatic detection system which uses fuzzy logic methodology for intrusion detection and analysis in sophisticated distributed system. The proposed system functions are to detect the occurrence of intrusions, their severity and impact on the system work. The authors indicate that the current system reveals to be experimental in nature. We propose the hierarchical agent architecture to increase the detection response speed and scalability of the system.
The problem of Input Output Decoupling is studied for the case of general neutral multi-delay systems, via proportional realizable output feedback. Using a pure algebraic approach, the necessary and sufficient conditi...
详细信息
An intrusion detection system (IDS) is a collection of sensors (often in the form of mobile agents) that collect data (security related events), classify them and trigger an alarm when unwanted manipulations to regula...
详细信息
An intrusion detection system (IDS) is a collection of sensors (often in the form of mobile agents) that collect data (security related events), classify them and trigger an alarm when unwanted manipulations to regular network behaviour is detected. Activities of attackers and network are time dependent. In the paper, fault trees with time dependencies (FTTD) are used to describe intrusions with emphasis put on timing properties. In FTTD, events and gates are characterized by time parameters. FTTD are used in verification whether the IDS reacts sufficiently quick on the intrusions. As an example, "the victim trusts the intruder" attack is analysed.
In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a...
详细信息
In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a new key distribution protocol for large and dynamic ad hoc networks over unreliable channel. Protocol proposed here involves broadcast exclusion based on polynomial interpolation and secret key cryptography. Proposed scheme ensures security of broadcast and one-to-one communication, message authentication and gives a possibility to verify routing information. It also ensures t-resilience which means that up to t nodes can be compromised without influencing the security
There are many applications of ad hoc sensor networks that have to ensure immunity to adversaries. One challenge is how to bootstrap secure communication among nodes. In this paper we propose a novel key pre-distribut...
详细信息
There are many applications of ad hoc sensor networks that have to ensure immunity to adversaries. One challenge is how to bootstrap secure communication among nodes. In this paper we propose a novel key pre-distribution scheme based on polynomials. The properties of our scheme are the same as a scheme presented by Blom, but we propose to use a different technique that can be easily extended if we get rid of a node's computation constrains. By using polynomial-based key pre-distribution, we can reduce the storage requried at receivers down to O(t) where t is a system and security parameter. Moreover using only this information, pairwise keys can be established efficiently for each pair of nodes which enable secure construction of the communication tree.
The necessary and sufficient conditions for the solvability of the exact model matching problem for general neutral single input - single output multi-delay systems, via a realizable dynamic output feedback and a real...
详细信息
暂无评论