Penetration testing offers strong advantages in the discovery of hidden vulnerabilities in a network and assessing network ***,it can be carried out by only security analysts,which costs considerable time and *** natu...
详细信息
Penetration testing offers strong advantages in the discovery of hidden vulnerabilities in a network and assessing network ***,it can be carried out by only security analysts,which costs considerable time and *** natural way to deal with the above problem is automated penetration testing,the essential part of which is automated attack *** previous studies have explored various ways to discover attack paths,all of them require perfect network information beforehand,which is contradictory to realistic penetration testing *** vividly mimic intruders to find all possible attack paths hidden in a network from the perspective of hackers,we propose a network information gain based automated attack planning(NIG-AP)algorithm to achieve autonomous attack path *** algorithm formalizes penetration testing as a Markov decision process and uses network information to obtain the reward,which guides an agent to choose the best response actions to discover hidden attack paths from the intruder’s *** results reveal that the proposed algorithm demonstrates substantial improvement in training time and effectiveness when mining attack paths.
This letter proposes a tunable balanceddual-band bandpass filter (BPF) with high common-mode (CM) suppression based on tri-stub loadedresonator (TSLr). Two TSLrs terminated with varactordiodes are employed to obtai...
This letter proposes a tunable balanceddual-band bandpass filter (BPF) with high common-mode (CM) suppression based on tri-stub loadedresonator (TSLr). Two TSLrs terminated with varactordiodes are employed to obtain the tunable seconddifferential-mode (dM) passband, which is independent of the first one. For validation, a tunable balanceddual-band BPF is designed, fabricated and measured that achieve the continuous frequency-tuning range of the seconddM passband from 5.968 to 6.368 GHz with constant 3dB fractional bandwidth (FBW) of 6.8% ± 0.17% and CM rejection levels of over 30 dB. The measuredresults agree well with the simulated ones.
Face recognition techniques have been developed significantly in recent ***,recognizing faces with partial occlusion is still a challenging *** there are many works to solve the problem of obscuring the face,the occlu...
详细信息
Face recognition techniques have been developed significantly in recent ***,recognizing faces with partial occlusion is still a challenging *** there are many works to solve the problem of obscuring the face,the occlusion is still a challenge in face *** overcome this issue,firstly we shoulddetect the occlusion position in the facial *** construct a robust self-encoding machine to solve the occlusion detection problem in face images and uses synthetic occlusion data for *** evaluated our method under various synthetic occlusion face *** show that our method can effectively detect various types of occlusion masks in an unsupervised manner and has betterrobustness to the occlusion categories.
The localization of a stationary transmitter using moving receivers is considered. The original direct Position determination (dPd) methods, with combined Time difference of Arrival (TdOA) and Frequency difference...
详细信息
The localization of a stationary transmitter using moving receivers is considered. The original direct Position determination (dPd) methods, with combined Time difference of Arrival (TdOA) and Frequency difference of Arrival (FdOA), do not perform well under low Signal-to-Noise ratio (SNr), and worse still, the computation cost is difficult to accept when the computational capabilities are limited. To get better positioning performance, we present a new dPd algorithm that proves to be more computationally efficient and more precise for weak signals than the conventional approach. The algorithm partitions the signal received with the same receiver into multiple non-overlapping short-time signal segments, and then uses the TdOA, the FdOA and the coherency among the short-time signals to locate the target. The fast maximum likelihood estimation, one iterative method based on particle filter, is designed to solve the problem of high computation load. A secondary but important result is a derivation of closed-form expressions of the Cramer-rao Lower Bound (CrLB). The simulation results show that the algorithm proposed in this paper outperforms the traditional dPd algorithms with more accurate results and higher computational efficiency, and especially at low SNr, it is more close to the CrLB.
Nowadays,cyberspace has become the "fifth frontier"after the ocean,land,air,and *** the globalization of information,cyberspace has never faced so many challenges,such as principle innovation,theory innovati...
详细信息
Nowadays,cyberspace has become the "fifth frontier"after the ocean,land,air,and *** the globalization of information,cyberspace has never faced so many challenges,such as principle innovation,theory innovation,technology innovation,and application ***,the transition from traditional cyberspace to new cyberspace is inevitable. In the future,cyberspace will have many important characteristics,such as openness,heterogeneity,mobility,dynamism,and security.
In order to solve the problem of sparse training samples in logo recognition task, a multi-type context-based logo data synthesis algorithm is proposed. The algorithm comprehensively utilizes the local and full contex...
In order to solve the problem of sparse training samples in logo recognition task, a multi-type context-based logo data synthesis algorithm is proposed. The algorithm comprehensively utilizes the local and full context of the logo object and the scene image to guide the synthesis of the logo image. The experimental results on the FlickrLogos-32 show that the proposed algorithm can greatly improve the performance of the logo recognition algorithm without relying on additional manual annotation, verify the validity of the synthesis algorithm, and further prove that multi-type context can improve the performance of the object recognition algorithm.
dear editor,Several studies have recently reported on major vulnerabilities in the Signaling system No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal ...
详细信息
dear editor,Several studies have recently reported on major vulnerabilities in the Signaling system No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal acquisition and tampering of mobile communication userdata, known as cellphone userdata. The cellphone userdata contain important information such as identity identification, location identification, security parameter-set. due to
Activation functions play a key role in providing remarkable performance in deep neural networks, and the rectified linear unit (reLU) is one of the most widely used activation functions. Various new activation functi...
详细信息
A high gain low cross polarization Fabry-Perot cavity antenna (FPCA) designed by AMC ground is presented in this paper. In particular, a strip line AMC ground is used to replace the PEC ground in order to reduce the c...
详细信息
A high gain Fabry-Perot cavity antenna (FPCA) designed by modifiedray tracking model(MrTM) is presented in this paper. In particular, the conventional ray tracking is modified in order to calculate the electric field...
详细信息
暂无评论