IEEE SoutheastCon, 2004. Proceedings.最新文献

筛选
英文 中文
ACE: Anomalous Code Elimination Through Automatic Detection Within Source Code 通过源代码内的自动检测消除异常代码
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287900
M. Stange
{"title":"ACE: Anomalous Code Elimination Through Automatic Detection Within Source Code","authors":"M. Stange","doi":"10.1109/SECON.2004.1287900","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287900","url":null,"abstract":"The ACE approach combines prior research techniques with new ones to eliminate anomalous code from source code. The idea is as follows: (1) identify characteristics/patterns of anomalous code, identify proper syntax, and identify rules of safe programming practices (2) encode the above items as evaluation properties, and (3) verify whether the evaluation passed or failed. This process has been automated into a pushdown automation tool that uses relational databases, process algorithms, static analysis and dynamic analysis.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"61 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating Realistic Network Traffic for Security Experiments 为安全实验生成真实的网络流量
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287918
Song Luo, G. Marin
{"title":"Generating Realistic Network Traffic for Security Experiments","authors":"Song Luo, G. Marin","doi":"10.1109/SECON.2004.1287918","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287918","url":null,"abstract":"This paper reports results of an effort to develop a test environment in which ¿live¿ attack-free background traffic reflects the characteristics of the network to be defended. The expectation is that new intrusion detection techniques can be better evaluated (and tuned), in such a background, against inserted attacks and no others. Based on analysis of traffic captured from an example network in 2003, we determine models appropriate for the major Internet protocols present and compare these with previously obtained results. We describe the traffic modeling, and we describe an approach for generating realistic attack-free traffic (that is statistically similar to the captured traffic) in a test environment.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Antenna Isolation, Wideband Multipath Propagation Measurements, and Interference Mitigation for On-frequency Repeaters 天线隔离、宽带多径传播测量和非频率中继器的干扰缓解
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287906
Christopher R. Anderson, S. Krishnamoorthy, Chris G. Ranson, Todd J. Lemon, W. G. Newhall, Thomas Kummetz, Jeffery H. Reed
{"title":"Antenna Isolation, Wideband Multipath Propagation Measurements, and Interference Mitigation for On-frequency Repeaters","authors":"Christopher R. Anderson, S. Krishnamoorthy, Chris G. Ranson, Todd J. Lemon, W. G. Newhall, Thomas Kummetz, Jeffery H. Reed","doi":"10.1109/SECON.2004.1287906","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287906","url":null,"abstract":"On-frequency repeaters provide network operators with a cost-effective means of extending coverage to areas of low signal strength. Their ability to transmit and receive on the same channel essentially renders their operation transparent to the rest of the network. The maximum gain of an on-frequency repeater is, however, limited by the amount of isolation that exists between the transmitter and receiver antennas. Adaptive cancellation techniques may be used to mitigate a lack of isolation, but their performance is limited by their ability to track the time-varying multipath in the channel which exists between the two antennas. This paper presents antenna isolation and wideband power delay profile measurement results for typical repeater installations. In addition, simulation results are presented from a novel adaptive filtering approach that allows repeaters to operate with gains equal to or greater than the existing isolation.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"84 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
.NET Security: IPSec vs. SSL .NET安全:IPSec与SSL
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287942
J. Raissi
{"title":".NET Security: IPSec vs. SSL","authors":"J. Raissi","doi":"10.1109/SECON.2004.1287942","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287942","url":null,"abstract":"This paper presents the results of work by the author on application and comparative performance of IP Security (IPSec) and Secure Socket Layer (SSL) protocols in a Microsoft .NET 3-tier client-server network. To evaluate the performance of each security protocol, the author created a typical 3-tier client-server e-commerce model in which data communication passed through three distinct pathways: (1) channel between client and Web server over Internet, (2) channel between the Web server and application server, (3) channel between the application server and database server. The primary focus in this paper remains on the third channel where IPSec and SSL were used to connect the application server to the database server. A preliminary analysis of the collected data sheds light on performance of IPSec and SSL in Microsoft .NET environment. It also suggests that in pathways where SSL and IPSec could be used interchangeably, the selection of the most suitable security protocol ought to be dynamic.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Power Injection Modeling and Sequential Power Flow Algorithm for FACTS Devices 一种高效的功率注入建模和顺序潮流算法
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287904
Nemat-Talebi, M. Ehsan, S. Bathaee
{"title":"An Efficient Power Injection Modeling and Sequential Power Flow Algorithm for FACTS Devices","authors":"Nemat-Talebi, M. Ehsan, S. Bathaee","doi":"10.1109/SECON.2004.1287904","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287904","url":null,"abstract":"This paper presents a sequential based Newton- Raphson power flow algorithm for reliable and efficiently handling power systems with embedded FACTS (Flexible AC Transmission Systems) devices. Computation and control of power flow in power systems with embedded FACTS devices appear to be fundamental for power system analysis and planning purposes. A power injection model for conventional FACTS devices such as SVC (Static Var Compensator) and TCSC (Thyristor Controlled Series capacitor) as well as modern FACTS devices such as STATCOM (Static Series Compensator) SSSC (Static Synchronous Series Compensator) and UPFC (Unified Power Flow Controller) is derived. Also a power injection model of conventional HVDC (High Voltage Direct Current) is obtained. Then a sequential power flow algorithm (two step algorithm) is adopted. The proposed injection models and sequential power flow algorithm have been programmed and systematically tested in a number of systems. The results of Ward-Hale network are reported which clearly illustrates the Capabilities and generalization of the proposed algorithm.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Toward a Graphical User Interface for Grid Services 面向网格服务的图形用户界面
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287937
M. Wood, C. Ferner, J. Brown
{"title":"Toward a Graphical User Interface for Grid Services","authors":"M. Wood, C. Ferner, J. Brown","doi":"10.1109/SECON.2004.1287937","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287937","url":null,"abstract":"The goal of the UNCW Grid project is to produce a user-friendly graphical environment for assembling and executing Grid applications. In this paper, we provide examples of the work done for this ongoing project. In particular we demonstrate a ¿drag-and-drop¿ approach to assembling complex Grid applications from individual Grid services. We also show how our graphical environment interacts with existing services to install and execute user applications on remote machines.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Synchronous and Asynchronous Architectures for DFT based Adaptive Equalizer 基于DFT的自适应均衡器的同步和异步结构设计
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287947
K. Santha, V. Vaidehi
{"title":"Design of Synchronous and Asynchronous Architectures for DFT based Adaptive Equalizer","authors":"K. Santha, V. Vaidehi","doi":"10.1109/SECON.2004.1287947","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287947","url":null,"abstract":"This paper presents the design of synchronous and asynchronous architectures for a Discrete Fourier Transform (DFT) based Finite Impulse Response (FIR) filter. The one dimensional filter is based on the delayed Least Mean Squares (DLMS) algorithm. The architecture is derived for a 1×4 array of processing elements. The proposed synchronous architecture is applied in adaptive equalization and the convergence results are analyzed using Matlab. The functionality of the architecture is verified by simulation via Actel¿s Veribest VHDL simulator. The synchronous architecture is modified to operate in asynchronous mode by implementing a two phase handshaking protocol between the processing elements (PEs). The performance of the proposed architectures is analyzed in terms of speed up, adaptation delay and throughput. The proposed DFT based DLMS systolic architecture leads to faster convergence when compared to conventional DLMS systolic architecture. In the asynchronous architecture the processors are clock independent. This reduces the adaptation delay and increases the throughput. The architectures are highly modular and very much suitable for VLSI implementation.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secured Mobile Device Software Update over IP Networks IP网络上的安全移动设备软件更新
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287929
W. Adi, A. Al-Qayedi, K. Negm, A. Mabrouk, S. Musa
{"title":"Secured Mobile Device Software Update over IP Networks","authors":"W. Adi, A. Al-Qayedi, K. Negm, A. Mabrouk, S. Musa","doi":"10.1109/SECON.2004.1287929","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287929","url":null,"abstract":"One of the major difficulties in managing mobile device maintenance is to perform software updates over the open network. Mobile devices are demanding more complex operation software. The manufacturer may need for some reason to update the operation software or even add new functionalities from time to time. The manufacturer may also want to sell selectively a new application to some interested mobile device owners. This operation could be performed over the open network. However both device owner and manufacturer should develop a mutual authentication and secured software download. The manufacturer would not like to reveal the software code for security and commercial reasons, at the same time the owner would like to be sure that the manufacturer is the one who is offering the code to be able to let the manufacturer take the responsibility for later device operation. This is a very old and common problem equivalent to software Intellectual Property Right (IPR) protection. A particular software download scenario is presented for mobile device environment and a secured protocol scenario is proposed. The solution includes mainly secret-key mechanisms together with special hardware architecture, which gives the whole process secure and less complex implementation in a mobile environment with low computational power requirements.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IPSec Offload Performance IPSec卸载性能
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287920
J. Raissi
{"title":"IPSec Offload Performance","authors":"J. Raissi","doi":"10.1109/SECON.2004.1287920","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287920","url":null,"abstract":"This paper presents the results of a case study that tested the performance of IPSec Offload feature of Microsoft Windows 2000 Server using 3COM 10/100 Mbps PCI Server NIC 3XP Processors. Based on the results of the benchmark, it was concluded that, in a few cases, a fast CPU with ample RAM and CACHE could yield better performance than a 3DES NIC using the IPSec Offload feature of Microsoft Windows 2000 Server. In most cases, with the IPSec Offload turned on, there was improvement in overall performance of the system. This paper concludes that in order to yield and maintain peak performance, the selection of encryption protocols and devices ought to be dynamic and based on runtime environmental factors.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective 无线电子邮件安全:从应用角度对信息隐私和保护的最新评述
IEEE SoutheastCon, 2004. Proceedings. Pub Date : 2004-03-26 DOI: 10.1109/SECON.2004.1287953
Risvan Coskun
{"title":"Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective","authors":"Risvan Coskun","doi":"10.1109/SECON.2004.1287953","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287953","url":null,"abstract":"This paper presents a state-of-the-art review of primary schemes for wireless e-mail security. It attempts to discuss most common standards available in the market place for e-mail security as well as their applicability on message privacy and protection. The main focus is given on e-mail security standards, message format types, email certificate and trust management systems and issues associated with each of these concepts from privacy and message integrity protection perspectives. Their applications on these two main security service areas are examined and real-world applied solutions are analyzed. The most common security standards, which are overviewed here, are 3DES, PEM, MOSS, PGP, PGP/MIME and S/MIME. It is assumed readers have basic knowledge on MIME specification.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信