Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Qing-qi PEI"'
Autor:
Yan-jing HU, Qing-qi PEI
Publikováno v:
Tongxin xuebao, Vol 38, Pp 118-126 (2017)
The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol an
Externí odkaz:
https://doaj.org/article/185e15fb90a74abc8be869fdab3cd9d1
Publikováno v:
网络与信息安全学报, Vol 3, Pp 18-27 (2017)
In order to solve the problem that parallel coordinate visualization graphic lines are intensive,overlap and rules of data is not easy to be obtained which caused by high dimension and immense amount of multidimensional data.Parallel coordinate visua
Externí odkaz:
https://doaj.org/article/0ca3f0db90984d7cbd72dadd983d5fdd
Autor:
Yan-jing HU, Qing-qi PEI
Publikováno v:
Tongxin xuebao, Vol 38, Pp 39-48 (2017)
Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a
Externí odkaz:
https://doaj.org/article/4399ebc6b3db48ca8ec6c58a0228b35a
Publikováno v:
网络与信息安全学报, Vol 2, Pp 11-20 (2016)
With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more
Externí odkaz:
https://doaj.org/article/775b2c3c719547ac9eb3f34e74bb377a
Publikováno v:
Tongxin xuebao, Vol 34, Pp 161-168 (2013)
In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpol
Externí odkaz:
https://doaj.org/article/e5bfb5ef2aa54d9990a8940e19cd2b89
Publikováno v:
Tongxin xuebao, Vol 34, Pp 144-158 (2013)
Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wireless environment to meet with the more spectrum requirement of users and improve spectrum utilization.However,it also brings new secure challe
Externí odkaz:
https://doaj.org/article/cbf92c758a3041d9a8880eef07104e45
Publikováno v:
Tongxin xuebao, Vol 33, Pp 282-286 (2012)
To overcome the limitations of individual rationality,a game control model was proposed.The controller of game is global rational.To achieve global optimization,the controller chooses strategies according to the control goal,and the controlled choose
Externí odkaz:
https://doaj.org/article/9538c7f722cb4227ade079d94c84708a
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
With the increase of congestible frequency spectrums and the rapid development of wireless sensor networks (WSNs) applications, the new technology—combing cogitative radio technology with WSNs—called CWSNs will bring broad prospects to the field
Externí odkaz:
https://doaj.org/article/423c02897dc64d198a83c0c7cd8c3232
Publikováno v:
Chinese Journal of Computers. 35:1059-1066
Publikováno v:
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 3:256-263