Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Jian-Zhen Luo"'
Publikováno v:
Tongxin xuebao, Vol 37, Pp 119-128 (2016)
A left-to-right inhomogeneous cascaded hidden Markov modelwas proposed and applied to model application protocol messages.The proposed modeldescribed the transition probabilities between states and the evolution rule of phases inside the states,revea
Externí odkaz:
https://doaj.org/article/824f079ab1144b6ea7bb39648e75ea61
Publikováno v:
Applied Sciences, Vol 9, Iss 12, p 2416 (2019)
Device to Device (D2D) communication is a key technology in 5th generation wireless systems to increase communication capacity and spectral efficiency. Applying caching into D2D communication networks, the device can retrieve content from other devic
Externí odkaz:
https://doaj.org/article/e2394a69ccb1481a9256c9211142e740
Publikováno v:
Symmetry, Vol 10, Iss 11, p 561 (2018)
Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to mai
Externí odkaz:
https://doaj.org/article/1c866732080a489d9c37dc61fc83d577
Publikováno v:
In Procedia Engineering 2011 15:4574-4578
Publikováno v:
Future Generation Computer Systems. 87:765-771
The community structure of the network will affect information transmission and the pronounced community structure will significantly reduce the network traffic capacity. In this paper, we propose a community weakening control strategy (CWCS) to enha
Publikováno v:
Applied Sciences, Vol 9, Iss 12, p 2416 (2019)
Applied Sciences
Volume 9
Issue 12
Applied Sciences
Volume 9
Issue 12
Device to Device (D2D) communication is a key technology in 5th generation wireless systems to increase communication capacity and spectral efficiency. Applying caching into D2D communication networks, the device can retrieve content from other devic
Publikováno v:
Symmetry
Volume 10
Issue 11
Pages: 561
Symmetry, Vol 10, Iss 11, p 561 (2018)
Volume 10
Issue 11
Pages: 561
Symmetry, Vol 10, Iss 11, p 561 (2018)
Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to mai
Publikováno v:
Multidimensional Systems and Signal Processing. 27:891-908
In this paper, a novel scheme is proposed for multi-sourced signal fusion and secure processing. Within a distributed compressed sensing (DCS) framework, traditional sampling, compression and encryption for signal acquisition are unified under the se
Publikováno v:
Information Security Practice and Experience ISBN: 9783319723587
ISPEC
ISPEC
Fuzz test is effective and efficient technique in discovering serious vulnerability in a network protocol by inserting unexpected data into the input message of the protocol and finding its bugs or errors. However, traditional fuzz test requires a la
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a52bd9268f3e0253bf98ac0696f7a75
https://doi.org/10.1007/978-3-319-72359-4_56
https://doi.org/10.1007/978-3-319-72359-4_56
Autor:
Jian-Zhen Luo, Shun-Zheng Yu
Publikováno v:
Journal of Network and Computer Applications. 36:1070-1077
Automatic protocol reverse engineering is a process of extracting protocol message formats and protocol state machine without access to the specification of target protocol. Protocol reverse engineering is useful for addressing many problems of netwo