The optimization of reconnaissance constellation is an important step in the construction of space-based information system, and the coverage performance is the key index of the optimization of reconnaissance constell...
详细信息
With the rapid development of information technology and space technology, the important position of space-based information support equipment is increasingly prominent. However, the increasing types and quantities of...
详细信息
It is difficult for some applications to extract feature functions in the process of data visualization. Focus on the problem of large-scale pairwise data visualization, the paper first introduces and analysis the pro...
详细信息
The aim of wireless sensor networks (WSNs) are to perceive, collect and process the information of sensor nodes within the coverage of the network. As a bridge between the physical world and the digital one, WSNs have...
详细信息
In view of the actual decentralized development of the satellite service constellation and the trend of space-ground integrated information network, based on the idea of clustering, methodology of complex network comm...
详细信息
Spatial information network itself is a comprehensive information network with multiple functions, which plays an important role in information acquisition, attack support, navigation and positioning, etc. In order to...
详细信息
With the surge of earth observation demands, the agile optical satellite scheduling has become a practical problem, which is hard to solve owing to the huge solution space and complex constraints. This paper proposes ...
详细信息
Main lobe interferences usually cause the distortion and peak offset of main lobe and the heighten of side lobe level in adaptive beamformers. The block matrix algorithm utilized the direction vector which was determi...
详细信息
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this p...
详细信息
ISBN:
(纸本)9781538629185
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this paper establishes an equivalent chaotic control *** we analyze this model by using Melnikov method and find out the condition under which the chaotic phenomenon will be *** order to get a sufficient proof for identifying the conclusion,simulation experiments are used to verify the validity of the control method.
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software.
暂无评论