Compared with traditional Hardware Design Languages (HDL) programming, High-Level Synthesis (HLS) can reduce the design difficulty of reconfigurable system. Most HLS tools target for systems on programmable chips, and...
详细信息
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u...
详细信息
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ...
详细信息
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op...
详细信息
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches...
详细信息
The inter-domain routing system is the key infrastructure of the Internet. However, BGP does not consider the link state in the routing selection process. As a result, when the inter-domain routing system faces securi...
详细信息
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall...
详细信息
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ...
详细信息
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
详细信息
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of...
详细信息
暂无评论