Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Chao-jing Tang"'
Publikováno v:
Tongxin xuebao, Vol 33, Pp 79-84 (2012)
A concept of forwarding credential was introduced,and a detection protocol of behavior was designed.A novel scheme which enhanced the prevalent binary Spray and Wait routing scheme was integrated with reputation to resist the impairment of selfishnes
Externí odkaz:
https://doaj.org/article/e84c732c90724b6091e263a8852a5cd8
Publikováno v:
Tongxin xuebao, Vol 33, Pp 125-131 (2012)
According to the practical requirements of intrusion detection,an integrated artificial immune system (IAIS) was proposed.The system combined dendritic cell algorithm(DCA)and negative selection algorithm(NSA).DCA was used to detect behavioral feature
Externí odkaz:
https://doaj.org/article/5b8edb8b39294fa2bfb115bf8ac6a85f
Autor:
Chao-Jing Tang, 湯朝景
97
The Continuous Wave Radar system is more suitable than the Pulse Radar system for many applications, especially in situations where a small, lightweight Radar sensor is required. The FMCW Radar system uses a very low probability of intercept
The Continuous Wave Radar system is more suitable than the Pulse Radar system for many applications, especially in situations where a small, lightweight Radar sensor is required. The FMCW Radar system uses a very low probability of intercept
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/02901619673062700618
Publikováno v:
Applied Mechanics and Materials. :539-545
Traditional Fuzzing is simple and easy to deploy but inefficient due to different inputs usually execute the redundant path. In this paper, we put forward a binary-oriented Fuzzing technique based on input format analysis and dynamic taint analysis,
Publikováno v:
Applied Mechanics and Materials. :553-558
Despite many automatic vulnerability detection approaches have been well documented, existing solutions for discovering software vulnerabilities in binary software are still difficult and time consuming. In this paper we present an approach based on
Publikováno v:
Communications in Theoretical Physics. 59:27-31
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation
Publikováno v:
Computer Science, Technology and Application.
Publikováno v:
2016 International Conference on Information System and Artificial Intelligence (ISAI).
In this paper, we propose reversed taint analysis to dig out the root cause of the vulnerability leading to crash. In order to increase the efficiency, we propose that during the analysis process, we should only taint the EIP register when the crash
Publikováno v:
ITM Web of Conferences, Vol 7, p 03004 (2016)
Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inne
Publikováno v:
ITM Web of Conferences, Vol 7, p 01002 (2016)
A novel formal method which can be used to analyze security properties such as accountability, fairness and timeliness in electronic payment protocols is proposed. The novel method extends Qing-Zhou approach based on logic reasoning by adding a simpl