Zobrazeno 1 - 10
of 33
pro vyhledávání: '"FANG Bin-xing"'
Publikováno v:
Tongxin xuebao, Vol 30, Pp 28-35 (2009)
Protocol inference, which discovers protocol characteristics automatically, is an important problem in traffic classification.An accurate and efficient inference method based on semantic analysis of text traffic was proposed.According to the semantic
Externí odkaz:
https://doaj.org/article/fc8761e7f76c4228ab029fb7f5afc7c7
Publikováno v:
Tongxin xuebao, Vol 30, Pp 125-129 (2009)
In order to investigate the insufficiency of target sampling in current network topology measurement practice and the distortion of measurement models,a sort of target sampling methods based on routing behavior analysis were pre-sented,namely,the uni
Externí odkaz:
https://doaj.org/article/846569c7f2c345b3b3fea13b8fdfac0f
Publikováno v:
Tongxin xuebao, Vol 30, Pp 42-47 (2009)
HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of cand
Externí odkaz:
https://doaj.org/article/a6fc4678c56f49408dcb4fa34e1ce8cf
Publikováno v:
Tongxin xuebao, Vol 30, Pp 21-26 (2009)
Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against repl
Externí odkaz:
https://doaj.org/article/3f60c6f856e040c69bc1a0d90104640b
Publikováno v:
Tongxin xuebao, Vol 30, Pp 106-117 (2009)
Firstly,various definitions of software assurance were discussed,the key properties of software assurance were summarized,and the software assurance model S3R(security,safety,reliability,survivability) was proposed to describe the discipline of s
Externí odkaz:
https://doaj.org/article/14164c364db74294875065db68081a88
Publikováno v:
Tongxin xuebao, Pp 96-101 (2007)
To build the prospect of Chinese IP-level topology,the traditional destination sampling method was evaluated;three new improved techniques were developed;and Chinese network was measured.With the methodology of complex network,the topology characteri
Externí odkaz:
https://doaj.org/article/abe71857e86f4e5a8e094e0788088e0f
Publikováno v:
Tongxin xuebao, Pp 90-95 (2007)
A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path su
Externí odkaz:
https://doaj.org/article/8a0d1fe1c82444d0b1e46518016e1452
Publikováno v:
Tongxin xuebao, Pp 1-7 (2007)
Worm detection and signature extraction was presented based on analysis of similar communication character-istics,which identifies the distinct communication pattern of worm spread,and evaluates the similarity metric of commu-nication characteristic
Externí odkaz:
https://doaj.org/article/d05630bada7e478da92ebd7aa1608133
Publikováno v:
Tongxin xuebao, Pp 48-52 (2007)
A network anomaly detection scheme based on TCM-KNN algorithm was proposed.Moreover,genetic algo-rithm(GA) based instance selection was introduced to boost the detection performance,meanwhile reduce the computa-tional cost for TCM-KNN.A series of
Externí odkaz:
https://doaj.org/article/36e981a2ed184f788ac6d67f2c38e484
Publikováno v:
Tongxin xuebao, Pp 39-47 (2007)
Through analyzing the security of SIP,combining PKI technology,digital time authentication,digital certifi-cate and the characteristic of SIP network,the safe communicated model of SIP network based on improved SIP protocol was put forward.New call e
Externí odkaz:
https://doaj.org/article/346390df4e374c87ab635ac54bf1f074