Netinfo Security最新文献

筛选
英文 中文
Research Status and Development Trends on Network Encrypted Traffic Identification 网络加密流量识别的研究现状及发展趋势
Netinfo Security Pub Date : 2019-03-19 DOI: 10.3969/J.ISSN.1671-1122.2019.03.003
Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang
{"title":"Research Status and Development Trends on Network Encrypted Traffic Identification","authors":"Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang","doi":"10.3969/J.ISSN.1671-1122.2019.03.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.03.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network 无线传感器网络中基于超立方体的成对密钥建立方案研究
Netinfo Security Pub Date : 2017-12-20 DOI: 10.3969/J.ISSN.1671-1122.2017.12.001
Hongyang Zhang, Li Xu, Limei Lin
{"title":"Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network","authors":"Hongyang Zhang, Li Xu, Limei Lin","doi":"10.3969/J.ISSN.1671-1122.2017.12.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.12.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of SSL VPN Technology in Mobile Police Video Access Link SSL VPN技术在移动警用视频接入链路中的应用
Netinfo Security Pub Date : 2017-09-20 DOI: 10.3969/J.ISSN.1671-1122.2017.09.001
Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie
{"title":"Application of SSL VPN Technology in Mobile Police Video Access Link","authors":"Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie","doi":"10.3969/J.ISSN.1671-1122.2017.09.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.09.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program Behavior Anomaly Detection Method Based on Improved HMM 基于改进HMM的程序行为异常检测方法
Netinfo Security Pub Date : 2016-09-20 DOI: 10.3969/J.ISSN.1671-1122.2016.09.022
X. Wu, Yuesong Yan, Xiaoran Liu
{"title":"Program Behavior Anomaly Detection Method Based on Improved HMM","authors":"X. Wu, Yuesong Yan, Xiaoran Liu","doi":"10.3969/J.ISSN.1671-1122.2016.09.022","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2016.09.022","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSSP-II Protocol Security Analysis Based on Communicating Sequential Process Method 基于通信顺序过程方法的RSSP-II协议安全性分析
Netinfo Security Pub Date : 2016-07-20 DOI: 10.3969/J.ISSN.1671-1122.2016.07.002
Debiao Lu, Shengjiao He, Jian Wang
{"title":"RSSP-II Protocol Security Analysis Based on Communicating Sequential Process Method","authors":"Debiao Lu, Shengjiao He, Jian Wang","doi":"10.3969/J.ISSN.1671-1122.2016.07.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2016.07.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Network Situation Assessment Method Based on Fuzzy Rough Set 基于模糊粗糙集的网络态势评估方法研究
Netinfo Security Pub Date : 2015-09-30 DOI: 10.3969/J.ISSN.1671-1122.2015.09.014
Yuan Fan, Zhilan Liu, Ji-wen Wang
{"title":"Research on Network Situation Assessment Method Based on Fuzzy Rough Set","authors":"Yuan Fan, Zhilan Liu, Ji-wen Wang","doi":"10.3969/J.ISSN.1671-1122.2015.09.014","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.09.014","url":null,"abstract":"Recently, the network security has become a severe issue. Obtaining the current network security status and predicting the future network security status may contribute to the decisions given by the decision makers. Under the large-scale and complex network environment, the traditional network management method cannot completely meet the demand of network situation awareness, and the network situation awareness based on information fusion has become the development direction of the future. Because network situation assessment is the core of network situation awareness, this paper introduces fuzzy rough set theory based on technologies of network security situation assessment, overcoming the defect that rough set method has to discretize while lost accuracy. By combining the advantages of the fuzzy set and rough set in dealing with uncertainty and vagueness of the data, this paper establishes a network security situation assessment model based on fuzzy rough set. The experiment shows that the model can provide high accuracy, and can provide a more accurate and reasonable evaluation results for the network security situation assessment.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Routing Algorithm of Opportunistic Social Networks Based on Network Coding 基于网络编码的机会主义社交网络路由算法
Netinfo Security Pub Date : 2015-02-10 DOI: 10.3969/J.ISSN.1671-1122.2015.02.009
Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao
{"title":"A Routing Algorithm of Opportunistic Social Networks Based on Network Coding","authors":"Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao","doi":"10.3969/J.ISSN.1671-1122.2015.02.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.02.009","url":null,"abstract":"In order to solve opportunistic social network with negative factors that the low success rate of data transmission and the large average network latency, we proposed the a routing algorithm of opportunistic social networks based on network coding(OSN-NC). The intermediate nodes of OSNNC routing algorithm are coded again only on the same target nodes of the coded data packet, so this can reduce the overall number of coded coeffi cients and the complexity of Gaussian elimination, and increase the reliability of data transmission. We use the message transmission strategy of combining PROPHET with network coding within the community, transmission the encoded data packets to the next hop node with greater encounter probability, until it reaches the destination node. We select the greater cumulative probability as the encoding node to complete message forwarding between the communities, until encounter intermediate nodes with the same community, then according to the messaging strategy within community. The simulation results show OSN-NC in improving network throughput and success rate of data transmission, reducing he average transmission delay other properties have signifi cantly improved.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Trend of Information Security in Industrial Control Systems 工业控制系统信息安全的新趋势
Netinfo Security Pub Date : 2015-01-20 DOI: 10.3969/J.ISSN.1671-1122.2015.01.002
Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin
{"title":"New Trend of Information Security in Industrial Control Systems","authors":"Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin","doi":"10.3969/J.ISSN.1671-1122.2015.01.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.01.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Method of Attributes-Based Cross-Domain Access 基于属性的跨域访问方法研究
Netinfo Security Pub Date : 1900-01-01 DOI: 10.1115/1.859759.paper55
Fu Lee Wang, Jiajing Zhou
{"title":"Research on the Method of Attributes-Based Cross-Domain Access","authors":"Fu Lee Wang, Jiajing Zhou","doi":"10.1115/1.859759.paper55","DOIUrl":"https://doi.org/10.1115/1.859759.paper55","url":null,"abstract":"This paper purposes a cross-domain access control framework base on the attributes synchronization, and purposes a cross-domain access control method in the framework, this method achieves the attributes synchronization between the base domains and outside domains. The method can timely and actively response the changing of the subject attributes to the outside domain, achieves fast matching of the mandated rules and dynamic authority in the cross-domain process. This method improves dynamic cross-domain access problems of IRBAC2000 too.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Active Anti-phishing Solution Based on Semi-fragile Watermark 基于半脆弱水印的主动反网络钓鱼解决方案
Netinfo Security Pub Date : 1900-01-01 DOI: 10.3923/itj.2013.198.203
Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie
{"title":"An Active Anti-phishing Solution Based on Semi-fragile Watermark","authors":"Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie","doi":"10.3923/itj.2013.198.203","DOIUrl":"https://doi.org/10.3923/itj.2013.198.203","url":null,"abstract":"A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信