Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati...
详细信息
ISBN:
(纸本)9781510804166
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode is performed, simultaneously, K mean algorithm is adopted to make clustering analysis for user behaviour; on the basis of conditions described as above, Hybrid Ant-Colony Algorithm (HBACA) is modified to search relationships between variety of grouping sets in the network instance, and identify each user role in the performing process of network instance. Simulation result shows that the algorithm can extract internal relations of communication behaviours between each network member, in order to obtain key role in a specific network instance.
In the area of compressed sensing(CS),the compressive sampling matching pursuit(Co Sa MP) algorithm offers a theoretical reconstruction guarantee in noise environment by exploiting a backtracking *** it relies on the ...
详细信息
In the area of compressed sensing(CS),the compressive sampling matching pursuit(Co Sa MP) algorithm offers a theoretical reconstruction guarantee in noise environment by exploiting a backtracking *** it relies on the sparsity of *** a stage by stage reconstruction structure,the sparsity adaptive matching pursuit(SAMP) algorithm can reconstruct signals when the sparsity is *** taking both advantages of Co Sa MP and SAMP,we propose a greedy algorithm for reconstruction of sparse signals,called the sparsity adaptive compressive sampling matching pursuit(SACo Sa MP).The proposed algorithm can reconstruct signals without prior information of sparsity,and it is robust to *** this paper,we give a residual upper bound of the proposed SACo Sa MP algorithm,and demonstrate the performance of it through simulation experiments.
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc...
详细信息
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of ***,there is little research on audio *** paper proposes an audio zero-watermark scheme base...
详细信息
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of ***,there is little research on audio *** paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio *** use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio ***,it extracts the audio profile,*** zero-watermark,according to the relative size of energies of consecutive *** experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops,this paper proposes a authentication protocol based on multi-level security virtual ***,t...
详细信息
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops,this paper proposes a authentication protocol based on multi-level security virtual ***,the user behavior authentication mechanism is introduced into the *** could achieve the legitimacy of the dynamic authentication of user behavior and improve the flexibility and security of ***,the protocol uses digital signature based on elliptic curve *** encryption algorithm is used to reduce the computational complexity of *** large integer inverse operation is eliminated in the signature equation,which guarantees the safety grade of the signature while improves its ***,the security of authentication protocol is proved by BAN logic.
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using...
详细信息
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops, this paper proposes a authentication protocol based on multi-level security virtual desk...
详细信息
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops, this paper proposes a authentication protocol based on multi-level security virtual desktops. Firstly, the user behavior authentication mechanism is introduced into the protocol. It could achieve the legitimacy of the dynamic authentication of user behavior and improve the flexibility and security of protocol. Secondly, the protocol uses digital signature based on elliptic curve cryptography. Symmetric encryption algorithm is used to reduce the computational complexity of it. The large integer inverse operation is eliminated in the signature equation, which guarantees the safety grade of the signature while improves its efficiency. Finally, the security of authentication protocol is proved by BAN logic.
Email spam is a critical problem to the Internet for a long time. The average amount of spam mail reached 72.1% of all email traffic in the world in 2012. The greatest threat to the email service providers was the spa...
详细信息
ISBN:
(纸本)9781479957415
Email spam is a critical problem to the Internet for a long time. The average amount of spam mail reached 72.1% of all email traffic in the world in 2012. The greatest threat to the email service providers was the spam mail sent from botnet, because the spam mail sent from botnet was accounting for more than 78% in 2011; therefore appeared many anti-spam solutions and techniques that were focus on the botnet. Owing to these anti-spam techniques, botnet spam is not effective as before. Spammers are finding new way to send the spam mail. One of the effective methods is using compromised accounts (or bot accounts) to send the spam mail because compromised accounts have good reputation IP addresses and compromised accounts send the spam mail with complete SMTP implemented server, such as Gmail, Yahoo!Mail, and Microsoft Live Mail. The spam mail send form compromised accounts are very difficult to be detected by any anti-spam techniques. Hence, we focus on the features spammers cannot easily hide. According to our research we find that normal users usually do not reply to the spam mail. Moreover, our empirical analysis reveals that the compromised account actually have low reply rate. We develop a system called “Hawkeye” that can find the compromised accounts effectively by checking the account's reply rate.
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ...
详细信息
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower bound on the sum- of-squares indicator for a balanced Boolean function satisfy- ing the propagation criterion with respect to some vectors. In this paper, if balanced Boolean functions satisfy the propaga- tion criterion with respect to some vectors, we give three nec- essary and sufficient conditions on the auto-correlation distri- bution of these functions reaching the minimum the bound on the sum-of-squares indicator. And we also find all Boolean functions with 3-variable, 4-variable, and 5-variable reaching the minimum the bound on the sum-of-squares indicator.
The DC motor is optimal designed using multi-objective hybrid Simulated Annealing(SA) algorithm. Typical examples of optimization show the efficiency and feasibility of the algorithm.
The DC motor is optimal designed using multi-objective hybrid Simulated Annealing(SA) algorithm. Typical examples of optimization show the efficiency and feasibility of the algorithm.
暂无评论