Recently, the problem of traffic jam in major cities is getting worse. By leveraging the taxi GPS data of Shenzhen, this paper analyzes the urban traffic status and proposes rational suggestions for urban traffic mana...
详细信息
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms f...
详细信息
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms for the class diagram and sequence diagram of UML are presented, which provide an engineering specification for the security protocol formalizing. Therefore, for verifying the confidentiality and correspondence of security protocols by Prover if, a transformation from extended UML model to Prover if Spi calculus model is realized with matching rules and knowledge reasoning, and then the verifying results are analyzed through a regular expression. Finally, the handshake, NS public key and buyer-seller watermarking protocols are verified, the attack traces of unsatisfied security properties are exported, that show the validity and applicability of the approach provided by this paper.
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including a...
详细信息
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including asset recognition, weakness analysis, consequence property confirmation and risk calculation. Each object is modeled with Petri net. Specialists recognize software assets by the 1-9 scales method of Analytic Hierarchy Process (AHP). The weaknesses in a system are found by the vulnerability scanner. The damage degree and the exploitation likelihood of a weakness are evaluated by such authorities as Common Weakness Enumeration (CWE). The consequence properties are confirmed by specialists according to the software requirements. Finally, in the risk calculation, risk degree and overall risk value are calculated by using exponential method and weighted average method respectively. Furthermore, we illustrate the application of our OOPN-SRAM method with realistic examples including web-banking and forum, and make a comparison with traditional methods. The results show that OOPN-SRAM not only increases the efficiency of the evaluation process, but also makes the evaluation result more objective and accurate.
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are g...
详细信息
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are given to develop the software available for routers using OpenWrt *** communication details are obtained and further simulated through Firebug tool,the graphical user configuration interface,based on the LuCi framework,and the bridging technology is used to solve the IPv6 connectivity issues in subnet *** account login and certification can be completed by the router,and the concise interface enables users to timely view their account status,modify their settings and monitor *** compiling and debugging,the software has successfully achieved these functions.
In this paper, a bayesian statistical inference-based estimation of distribution algorithm (BEDA) is proposed for the re-entrant job-shop scheduling problem with sequence-dependent setup times (RJSSPST) to minimize th...
详细信息
In this paper, a method about how to identify insecure behaviors of browser extensions is proposed. Typically, the identification of insecure extension behaviors is based on knowledge which is got by investigating kno...
详细信息
ISBN:
(纸本)9781479965144
In this paper, a method about how to identify insecure behaviors of browser extensions is proposed. Typically, the identification of insecure extension behaviors is based on knowledge which is got by investigating known malicious or vulnerable extensions. We present an automatic technique that can ease the laborious manual investigating process. Our technique mines the difference between the behavior graphs of insecure and secure extensions based on graph mining algorithm. The difference between them is the specification of insecure extension behaviors which can be further analyzed manually or automatically to help people make a better decision about whether an extension is secure or not. We developed a prototype and the experimental results show that this kind of technique can effectively extract insecure extension behaviors.
High-precision target position computing is a fundamental issue in astronomical research. Aiming at the requirements of high-precision positional computing in data processing of a Chinese spectral radio heliograph(CSR...
详细信息
ISBN:
(纸本)9781784660543
High-precision target position computing is a fundamental issue in astronomical research. Aiming at the requirements of high-precision positional computing in data processing of a Chinese spectral radio heliograph(CSRH) pipeline, in this study, we implemented a Python package for high-precision position computing with the JPL DE405 ephemeris. The SWIG technique is used to invoke the functions written by C language in a Python environment. The final results were carefully verified and proved correct. Comparing with the original NOVAS package, our study brings higher precision and higher performance. The software can be used in a Python environment and produces the high-precision results to meet the requirements of the CSRH data processing.
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a ...
详细信息
Wireless coexistence is crucial with the explosive development of wireless technologies in recent years. The coexistence issues of IEEE 802.11 b/g and IEEE 802.15.4 have been well studied, however few work focused on ...
详细信息
ISBN:
(纸本)9781479975761
Wireless coexistence is crucial with the explosive development of wireless technologies in recent years. The coexistence issues of IEEE 802.11 b/g and IEEE 802.15.4 have been well studied, however few work focused on 802.11n new features including MIMO, channel bonding and frame aggregation. In this paper, we conducted extensive experiments to understand how 802.11n impact on 802.15.4 and vice versa in a systematic way. We consider primary features of 802.11n both in symmetric and asymmetric scenarios. The goal of our work is to gain more insights into the coexistence issues of 802.11n and 802.15.4 and thus to help protocol design and co-located network deployments.
This paper considers two mutual-information based approaches for clustering random variables proposed in the literature: clustering by mutual information relevance networks (MIRNs) and clustering by multivariate mutua...
详细信息
ISBN:
(纸本)9781509018253
This paper considers two mutual-information based approaches for clustering random variables proposed in the literature: clustering by mutual information relevance networks (MIRNs) and clustering by multivariate mutual information (MMI). Despite being two seemingly very different approaches, the derived clustering solutions share very strong structural similarity. Motivated by this curious fact, in this paper we show that there is a precise connection between these two clustering solutions via the celebrated Chow-Liu tree algorithm in machine learning: Under a Chow-Liu tree approximation to the underlying joint distribution, the clustering solutions provided by MIRNs and by MMI are, in fact, identical. This solidifies the heuristic view of clustering by MMI as a natural generalization of clustering by MIRNs from dependency-tree distributions to general joint distributions.
暂无评论