This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode...
详细信息
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b...
详细信息
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi...
详细信息
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses...
详细信息
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th...
详细信息
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi...
详细信息
With the continuous expansion of the business scale of the Internet of Things, the concept of the Internet of Everything has been deeply rooted in the hearts of the people. At the same time, various security issues ha...
详细信息
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI....
详细信息
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e...
详细信息
暂无评论