The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli...
详细信息
ISBN:
(数字)9781728131290
ISBN:
(纸本)9781728131306
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The application of this algorithm effectively solves the attribution problem of non-cluster head node in conventional algorithms, and consumption is evenly distributed throughout the network. Through simulation experiments, it can be found that the application of the SCC algorithm can map the distribution of nodes of cluster head reasonably and delay the death time of the first node to prolong the lifetime of network and balance the energy consumption of nodes.
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
详细信息
Aiming at the stack overflow vulnerability in binary software, this paper proposes a binary vulnerability detection method based on the attention mechanism. First, this paper analyze the basic characteristics of stack...
详细信息
Aiming at the stack overflow vulnerability in binary software, this paper proposes a binary vulnerability detection method based on the attention mechanism. First, this paper analyze the basic characteristics of stack overflow vulnerabilities, and perform data preprocessing on the decompiled files to make the neural network better adapt to the characteristics of stack overflow vulnerabilities, then formulate instruction specifications at the assembly language level, and finally input the data into the fusion attention mechanism Learning in the neural network. This paper compares and analyzes three kinds of neural networks on the CWE121 data set. The experimental results show that after neural network training, the detection method based on the attention mechanism can be effective and accurately discover whether the target area has stack overflow vulnerabilities, thereby greatly improving the detection efficiency.
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b...
详细信息
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi...
详细信息
The current analysis of computer forensics is still dependent on the investigation personnel, leading to the problem of heavy workload and low efficiency. At the same time, computer evidences have the characteristics ...
详细信息
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative *** learning algorithms are developed to detect the maliciousness of PDF *** the exploits of new vulne...
详细信息
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative *** learning algorithms are developed to detect the maliciousness of PDF *** the exploits of new vulnerabilities occur,the assumption that the training data and the test data share the same distribution does not hold and the ability of origin model to detect exploits of new vulnerabilities weakens *** a real environment,it is very difficult to obtain numerous samples of exploits with the same *** the machine learning models are difficult to be improved by *** sample generation could be used to generate sufficient virtual samples by small sample sets to improve the generalization of the existing model.A new VSG algorithm based on prior knowledge is proposed in this paper,which performs better than other VSG algorithms in improving the detection on exploits of new vulnerabilities.
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unkno...
详细信息
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr...
详细信息
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we present a method for geometrically characterizing uncertainty relations as an entire area of variances of the observables,ranging over all possible input *** find that for the pair of position and momentum operators,Heisenberg's uncertainty principle points exactly to the attainable area of the variances of position and ***,for finite-dimensional systems,we prove that the corresponding area is necessarily semialgebraic;in other words,this set can be represented via finite polynomial equations and inequalities,or any finite union of such *** particular,we give the analytical characterization of the areas of variances of(a)a pair of one-qubit observables and(b)a pair of projective observables for arbitrary dimension,and give the first experimental observation of such areas in a photonic system.
We study in this paper the function approximation error of linear interpolation and extrapolation. Several upper bounds are presented along with the conditions under which they are sharp. All results are under the ass...
详细信息
暂无评论