In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan...
详细信息
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas...
详细信息
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex...
详细信息
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ...
详细信息
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses...
详细信息
The design of secure password authenticated key exchange (PAKE) protocols with RSA is a nontrivial hard work. Until now there have been only a few secure PAKE protocols based on RSA and most of them work in the two-pa...
详细信息
A novel memory consistency model for thousand-core processors is presented. The model simplifies cache coherence for the full chip, and reduces cache design complexity. In addition, the model has the ability to descri...
详细信息
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
详细信息
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie...
详细信息
暂无评论