Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely...
详细信息
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to...
详细信息
As quantum computing continues to advance, the complexity of control systems for superconducting qubits also increases. This paper presents a genetic algorithm (GA) approach for optimizing the control systems in quant...
详细信息
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien...
详细信息
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th...
详细信息
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
详细信息
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ...
详细信息
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots...
详细信息
In this paper, we focus on differential fault attack on lightweight block ciphers with GFN (Generalized Feistel Networks) structure. With regard to fault injection model and differential equations solving, two improve...
详细信息
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q...
详细信息
暂无评论