In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
详细信息
Currently, encrypted traffic using the TLS protocol is widely used, and there are a lot of malicious and unknown behaviors. It is an important goal in the research field to detect the traffic behavior of TLS and maint...
详细信息
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu...
详细信息
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI....
详细信息
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi...
详细信息
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode...
详细信息
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic...
详细信息
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e...
详细信息
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi...
详细信息
暂无评论