Zobrazeno 1 - 10
of 359
pro vyhledávání: '"Peng-Jun Wan"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity
Externí odkaz:
https://doaj.org/article/ca97b9f7ffe840428fd22e19ac95af63
Publikováno v:
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 13:24-39
An effective approach to detect stepping-stone intrusion (SSI) is to estimate the length of a connection chain. This type of detection method is referred to as the network-based SSI detection (SSID). Previously known network-based approaches for SSID
Publikováno v:
Advances in Science, Technology and Engineering Systems Journal. 7:13-19
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:4270-4284
Publikováno v:
Theoretical Computer Science. 931:78-92
Publikováno v:
Tsinghua Science and Technology. 27:432-442
An effective method to detect stepping-stone intrusion (SSI) is to estimate the length of a connection chain. This type of detection method is referred to as a network-based detection approach. Existing network-based SSI detection methods are either
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
Hackers on the Internet usually send attacking packets using compromised hosts, called stepping-stones, in order to avoid being detected and caught. With stepping-stone attacks, an intruder remotely logins these stepping-stones using programs like SS
Publikováno v:
ACM Transactions on Sensor Networks. 17:1-21
Due to the merit without requiring charging cable, wireless power transfer technology has drawn rising attention as a new method to replenish energy for Wireless Rechargeable Sensor Networks. In this article, we study the mobile charger scheduling pr
Publikováno v:
Journal of Parallel and Distributed Computing. 142:77-89
In recent years, with the continuous expansion of metropolitan area networks, the routing security problem has become more and more serious. In particular, promise-violating attack to inter-domain routing protocol is one of the most difficult attacks
Publikováno v:
IEEE Transactions on Mobile Computing. 19:880-893
Utilizing the intelligence at the network edge, edge computing paradigm emerges to provide time-sensitive computing services for Internet of Things. In this paper, we investigate sustainable computation offloading in an edge-computing system that con