2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
Synchronization of Uncertain Lorenz Chaotic Systems Based on a Novel Active Pining Control 基于一种新型主动拼接控制的不确定洛伦兹混沌系统同步
Qu Shao-cheng, Gong Mei-jing
{"title":"Synchronization of Uncertain Lorenz Chaotic Systems Based on a Novel Active Pining Control","authors":"Qu Shao-cheng, Gong Mei-jing","doi":"10.1109/CIS.WORKSHOPS.2007.183","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.183","url":null,"abstract":"This paper discusses the synchronization of two Lorenz chaotic systems with parameters perturbation. Based on active control strategy, a novel active pining control synchronization approach is presented. The design of the whole controller only uses a system state. According to Lyapunov stability theory, the synchronization conditions of active pining control method for the two uncertain chaotic systems are given. And robust stability of uncertain chaotic systems synchronization is guaranteed. Numerical simulations are used to show the robustness and effectiveness of the proposed control strategy.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Revising Configure Parameter in Embedded System and Its Application 嵌入式系统配置参数的修正及其应用研究
T. Hai, Zhou Xin-qin
{"title":"Study on Revising Configure Parameter in Embedded System and Its Application","authors":"T. Hai, Zhou Xin-qin","doi":"10.1109/CIS.WORKSHOPS.2007.222","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.222","url":null,"abstract":"The article expounds the technology that UPD protocol is applied when revising configured the parameter remotely in embedded system. It also introduces the process in realizing the system with the corresponding codes in detail and related communication protocols. Finally gives a example how the research being applied for the \"home-school-communication \" system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AAA Architecture for Unified Configuration Management in Large-Scale Network 面向大规模网络统一配置管理的AAA架构
Wang Jinsong, Lou Jia, Wu Shaoying, Wang Zhengxu, Wu Gong-yi
{"title":"AAA Architecture for Unified Configuration Management in Large-Scale Network","authors":"Wang Jinsong, Lou Jia, Wu Shaoying, Wang Zhengxu, Wu Gong-yi","doi":"10.1109/CIS.WORKSHOPS.2007.159","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.159","url":null,"abstract":"Unified configuration management of network devices in large-scale environment is an important issue. As a traditional method, password authentication by router can not verify the administrators' identities. In other words, someone who actually is not an administrator, can also access the router if he knows password. In this paper, we present a new policy-based AAA architecture that uses VPN and certificate-based authentication. By implementing the architecture, administrators can access authorized routers only and execute authorized commands. Single Sign-On mechanism is used to simplify authentication process. Moreover, the actions of administrators can be logged for accounting. Finally, we implement the architecture in Tianjin Education Metropolitan Area Network.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Simple Matrix Representation Method of the BM Algorithm Using in Flowing Cipher Field 流动密码域中BM算法的一种新的简单矩阵表示方法
Qian Yin, Ping Guo, Zukuan Wei, Zhiyong He
{"title":"A New Simple Matrix Representation Method of the BM Algorithm Using in Flowing Cipher Field","authors":"Qian Yin, Ping Guo, Zukuan Wei, Zhiyong He","doi":"10.1109/CIS.WORKSHOPS.2007.79","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.79","url":null,"abstract":"In this paper, a new simple representation of the Berlekamp-Massey algorithm was proposed, which resolves the problem of the length of the shortest linear recurrence in the flowing cipher study. In the process of investigating the Berlekamp-Massey algorithm, using matrix-method can help to simplify the representation of the Berlekamp-Massey algorithm and easily calculate the distributing regulation of the shortest linear recurrence length compared to the traditional method.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganalysis Based on Lifting Wavelet Transform for Palette Images 基于提升小波变换的调色板图像隐写分析
Jiaohua Qin, Xingming Sun, Xuyu Xiang
{"title":"Steganalysis Based on Lifting Wavelet Transform for Palette Images","authors":"Jiaohua Qin, Xingming Sun, Xuyu Xiang","doi":"10.1109/CIS.WORKSHOPS.2007.202","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.202","url":null,"abstract":"Based on the statistical analysis of the correlation between the low frequency sub-band coefficients and the high frequency sub-band coefficients in wavelet domain, a novel steganalytic algorithm with the ability of reliable detecting modifications in palette images is proposed in this paper. First, we divide the image into non-overlapping 8times8 blocks and perform integer wavelet transform based on lifting scheme to each block. Then, the average correlation, which is used to determine whether the secret message exists or not in palette images, is calculated according to the correlation between low frequency coefficients and high frequency coefficients. Experimental results show that the new algorithm can achieve better performance than the pairs analysis. Moreover, it is easy to be implemented and well-suited for real-time detection.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Evolutionary Algorithm for a Kind of Nondifferentiable Nonlinear Bilevel Programming 一类不可微非线性双层规划的有效进化算法
Dalian Liu, Dong Chen
{"title":"An Efficient Evolutionary Algorithm for a Kind of Nondifferentiable Nonlinear Bilevel Programming","authors":"Dalian Liu, Dong Chen","doi":"10.1109/CIS.WORKSHOPS.2007.144","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.144","url":null,"abstract":"A special kind of nonlinear bilevel programming problems (nonlinear BLPP in short) is transformed into an equivalent single objective nonlinear programming problem. To solve the equivalent problem effectively, we first design a fitness function based on entropy function. By using this fitness function, we not only can decrease the leader's objective value, but also can force the infeasible solutions moving towards the feasible region, and improve the feasible solutions gradually. Then an effective crossover operator is used to generate high quality offspring. Based on these, a new evolutionary algorithm for nonlinear BLPP is proposed. Finally, simulations on several benchmark problems are made and the results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"648 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing Algorithm of Network Coding on Multicast 组播网络编码的路由算法
Shaoguo Tao, Wenbo Qiao, Zongkai Yang, W. Cheng
{"title":"Routing Algorithm of Network Coding on Multicast","authors":"Shaoguo Tao, Wenbo Qiao, Zongkai Yang, W. Cheng","doi":"10.1109/CIS.WORKSHOPS.2007.152","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.152","url":null,"abstract":"As a novel transmission mechanism to enhance the performance of multicast network, network coding (NC) has received much researcher concern recently. Due to its inherent characteristic, the process of constructing the routing paths in network coding is different from the traditional IP multicast based on replicating and forwarding. In this paper, we analyze the algebraic model of network coding and conclude that the goal of the routing problem in network coding is to build edge-disjoin paths from the source to each receiver. Using the idea of tree packing, we present a detailed routing algorithm for network coding based multicast. Simulations based on the algorithm show that, for network coding based multicast, performance in terms of achievable throughput and bandwidth consumption has been improved significantly with respect to the traditional IP multicast.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improvement on Precision in DDoS Source-End Detection with Multi-stream Combined HMM 多流组合HMM提高DDoS源端检测精度
Jian Kang, Qiang Li, Yuan Zhang, Zhuo Li
{"title":"An Improvement on Precision in DDoS Source-End Detection with Multi-stream Combined HMM","authors":"Jian Kang, Qiang Li, Yuan Zhang, Zhuo Li","doi":"10.1109/CIS.WORKSHOPS.2007.86","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.86","url":null,"abstract":"DDoS (distributed denial-of-service) attacks detection system deployed in source-end network is superior in perceiving and throttling attacks before dataflows enter Internet, comparing with that in victim network. However, the current existed works in source- end network are so fragile, lead to a high false-positive rate and false-negative rate. This paper proposes a novel approach using multi-stream combined hidden Markov model (MC-HMM) on source-end DDoS detection for integrating multi-features simultaneously. The multi-features include the S-D-P three-tuple, TCP header Flags, and IP header ID field. Through experiments, we compared our original approach based on multiple detection features with other algorithms (such as CUSUM and HMM). The results present that our approach effectively reduces false-positive rate and false-negative rate, and improves the precision of detection.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection 基于危险理论的多智能体人工免疫系统异常检测
Haidong Fu, Xiguo Yuan, Na Wang
{"title":"Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection","authors":"Haidong Fu, Xiguo Yuan, Na Wang","doi":"10.1109/CIS.WORKSHOPS.2007.62","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.62","url":null,"abstract":"Inspired by the potential interesting ideas of the danger theory (DT), the research into artificial immune system (AIS) has been developing faster then ever. The basic role of DT embedded in AIS is to provide what T-cells should respond through the professional antigen-presenting cells when there are some cells undergoing injury, or stress or 'bad cell death'. However, in the context of AlS-based network security systems, how to minimize damage by mitigating virus infection is a key step to solve real-world problems. In this paper we present the blueprint of a DT inspired multi-agents AIS for anomaly detection, it is called MAAIS, which can dynamically adapt to various types of immune responses by configuring parameters during the course of evaluating the degree of danger signals received. Additionally, a suitable mechanism of communication between agents is employed to stipulate the better performance of the novel system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Variable Universe Multiple-Fuzzifications Control 变域多重模糊控制
Tianli Li, Hong Hu, Liang Zheng
{"title":"Variable Universe Multiple-Fuzzifications Control","authors":"Tianli Li, Hong Hu, Liang Zheng","doi":"10.1109/CIS.WORKSHOPS.2007.166","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.166","url":null,"abstract":"A novel method is being proposed for the design of the fuzzy logic controller (FLC) in order to improve the controlling precision. This paper describes the design and implementation of some FLCs based on the variable universe and the multiple-fuzzifications methods. They are different from conventional FLC's design method. No complex algorithm is required to implement the controllers. The actual performance of the novel FLCs at controlling the water tank temperature were evaluated against the performance of an intelligent temperature controller. The experiment results show that the design of fuzzy controllers can not only be carried out simply and easily, but also can improve the control performance. The effective methods proposed are easily implementable on commonly used equipment such as PLC. Generally, the novel fuzzy controllers can both improve the performance of control system and cut down the cost of hardware.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134105556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信