Multiplayer Online Battle Arena (MOBA) games currently dominate the esports landscape, offering a concrete and vivid embodiment for team comparisons, where accurately predicting the winning team is both important and ...
详细信息
Restoring the patient's occlusal function of broken teeth is a challenging task since tooth texture is very complex, a slight deviation may affect the patient's chewing function and temporomandibular joint fun...
详细信息
Rainfall is the main cause of flood disasters, and analyzing its features plays a crucial role in preventing flood disasters. How to extract rainfall process features and conduct rainfall similarity analysis is a chal...
详细信息
Hyperspectral object tracking (HOT) captures subtle object features, enabling precise identification and tracking in complex backgrounds. However, the high-dimensional nature of data and rapid object changes in dynami...
详细信息
To reconstruct 3D human figures with fine-grained details from sparse views, this paper proposes a novel framework called VR-Recon, which is based on a viewpoint refiner. In this framework, we first decouple geometric...
详细信息
Recently, tensor singular value decomposition (TSVD) within high-order (Ho) algebra framework has shed new light on tensor robust principal component analysis (TRPCA) problem. However, HoTSVD lacks flexibility in hand...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mechanisms,the identification of malicious flows depends on the IP ***,the IP address is easy to be changed by *** the IP address,the certificate ismore challenging to be tampered with or ***,the traffic trend in the network is towards *** certificates are popularly utilized by IoT devices for authentication in encryption *** proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN *** on DTLShps,the SDN controller can collect statistics on *** this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for *** goal is ***,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire ***,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay ***,for detecting the Crossfire attack accurately,a method based on graph connectivity is ***,several trust-based routing principles are proposed tomitigate the Crossfire *** principles can also encourage users to use certificates in *** performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting ***,our trust model has a more appropriate decay rate than the traditional methods.
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o...
详细信息
Purpose: This paper presents a theoretical analysis of the DynaTrans algorithm, a novel approach for dynamic optimization of urban transportation networks. Design/methodology/approach: We introduce an Adaptive Closene...
详细信息
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a...
详细信息
暂无评论