With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we p...
详细信息
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-thc-middle attack and successfully protecting AP from SYN Flood attack than other existing approaches.
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applie...
详细信息
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applied in different domains. However after we learned most of the similarity measures based on ontology, we found that most researchers did not deal with these characters. In this paper we work at the similarity computation based on ontology applied in semantic retrieval. We analyze the characters about this application and problems to be improved, and then we propose an improved semantic similarity computation model. At last, we demonstrate the improvement of this model through experiments.
Identifying protein-protein interaction sites have important connotations ranging from rational drug design to analysis metabolic and signal transduction networks. In this paper, we presented an adapted Bayesian class...
详细信息
Recently, the key of network security is turning from passive detection to active defense. However, most works focused on how fast it can detect the DDoS attack and start defence, and existing methods for differentiat...
详细信息
Recently, the key of network security is turning from passive detection to active defense. However, most works focused on how fast it can detect the DDoS attack and start defence, and existing methods for differentiating DDoS attack packets, especially SYN flooding attacks, are too time-expensive. When SYN flooding started, victim servers have to call for a lot of memory, usually more than 500 MB, to store the attack packets. To make the differentiating scheme more robust, we record the TCP session statistics (IP-TTL) of SYN packets in a traceback-based bloom filter (TBF), and as the attacks start, we match the SYN packets and IP-TTL statistics to differentiate the attacks packets. In addition, we introduce the trace-back strategy to filter the frequently attacked TBF's IP. In comparison with current methods, the proposed approach can both hold back large-scale fake IP and defend IP spoofing. Experiments verify that once applied the proposed method in Snort_inline, the hold back precision is 98.65% and the semi-join queue is almost empty, otherwise, the precision is near to zero and the semi-join queue is full.
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total tra...
详细信息
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total transmission rate in a differential multiple-input-multiple-output (MIMO) orthogonal-frequency-division-multiplexing (OFDM) system, a rate embedded doubly directional DSTF coding scheme is proposed for doubly selective fading channels in this paper. High rate differentially coded matrices are embedded into proper time blocks and sub-carriers. In the frequency domain, both high rate non-unitary message matrices and low rate unitary message matrices are differentially transmitted alternately. In the time domain, all message matrices have full rates. Simulation results verify that, compared with those conventional DSTF coding schemes, the proposed scheme can achieve better error performances with higher transmission rates.
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of...
详细信息
ISBN:
(纸本)9781424452378
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of the equation. It is an important measurement of non-interferometry. A new phase retrieval based on transport-of-intensity equation is presented. This method has the advantage of measuring only the close-up space on the plane of the intensity of light to the reconstruction of phase space. The problem of phase retrieval is translated into minimum of energy functional with linear convolution and total variation regularization. The one and two dimension experiment results show the correctness and validity of the algorithm.
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the gro...
详细信息
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the group and all members, and exists a designated clerk, which creates a warrant recording the identities of the signers and other import information. Any t members can collaboratively generate the group signature with the help of the clerk, who verifies the validity of the partial signatures and combines them to the group signature. Any one can verify the correctness of the group signature by the public information and trace out to find the identities of the signers by the warrant.
The rapid development of the Web technology makes the Web mining become the focus of the current data mining, and the XML technology also becomes the standard of the data exchange on the Web. The paper introduces the ...
详细信息
ISBN:
(纸本)9781424454112
The rapid development of the Web technology makes the Web mining become the focus of the current data mining, and the XML technology also becomes the standard of the data exchange on the Web. The paper introduces the Web mining technology, implements a frame of the Web mining based on the XML technology according to the advantage of XML in the data description, describes the implementation process of specific Web mining, and puts forward a promoting scheme on solving XML documents with VTD which solves the difficult mining problem on the Web caused by the most of the non-structure information.
Typical synthetic aperture radar (SAR) images are two-dimensional, providing range and azimuth information, but furnish few details with respect to elevation. First of all, one approach to extend SAR to three-dimensio...
详细信息
ISBN:
(纸本)9781424444793;9781424444809
Typical synthetic aperture radar (SAR) images are two-dimensional, providing range and azimuth information, but furnish few details with respect to elevation. First of all, one approach to extend SAR to three-dimensional imaging is considered. The simplest implementation of this would replace the single antenna element by a linear array oriented vertically. Secondly, the outlining data and image processing for a three-dimensional application is introduced in detail in the paper. Finally, simulation results show that the proposed algorithm is effective, while maintaining good image quality in terms of the reconstructed target response.
In this paper, we characterize the trees with the largest Laplacian and adjacency spectral radii among all trees with fixed number of vertices and fixed maximal degree, respectively.
In this paper, we characterize the trees with the largest Laplacian and adjacency spectral radii among all trees with fixed number of vertices and fixed maximal degree, respectively.
暂无评论