Applied Mechanics and Materials
Vol. 456
Vol. 456
Applied Mechanics and Materials
Vol. 455
Vol. 455
Applied Mechanics and Materials
Vol. 454
Vol. 454
Applied Mechanics and Materials
Vols. 448-453
Vols. 448-453
Applied Mechanics and Materials
Vols. 446-447
Vols. 446-447
Applied Mechanics and Materials
Vols. 444-445
Vols. 444-445
Applied Mechanics and Materials
Vol. 443
Vol. 443
Applied Mechanics and Materials
Vol. 442
Vol. 442
Applied Mechanics and Materials
Vol. 441
Vol. 441
Applied Mechanics and Materials
Vol. 440
Vol. 440
Applied Mechanics and Materials
Vols. 438-439
Vols. 438-439
Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials Vol. 443
Paper Title Page
Abstract: The feedbacks of the results of assessing the network security strategy based on security capability, as a reference to the security strategy for effective adjustment, providing a more robust system and improve the safety. The correct security strategy results from the correct understanding on the system security demands and effective assessment model, because the various security domain information subjects and objects have different security needs. On the basis of the establishment of the network security strategy based on security domain, through analysis of the security strategy defensive methods, application objects, information security attributes and their relationship, this paper proposed an assessment model of network security strategy based on security capability, and analyzed the impact of the network security strategy attributes upon network security capability, that is the robust security strategy is conducive to system safety.
446
Abstract: As the development of the network keeps on continuously changing, there is the very existence of brand new attacks that are unceasing. Under this circumstance, the corresponding network security system should be required to be equipped with adaptability. In this paper, active defense technologies are integrated on the basis of the traditional network security system. The active defense technologies have included the intrusion deception, dynamic forensic and so on. Through the connection with the traditional passive defense technologies such as the firewall and so on, a dynamic, comprehensive and adaptable network security system can be built. In addition, a detailed analysis research can be carried out on the work process.
451
Abstract: In the invading testing, the testing of unknown is mainly accomplished by the abnormal testing. Traditional abnormal testing methods need to construct a normal behavior feature outline reference mode. When establish this mode, it is needed to have large amount of pure normal data set, and this data set usually is not easy to gain from the real network. Whats worse, the problem of too much error reports and leaking reports in the abnormal testing is pervasive. In order to overcome this shortage, this paper rises a abnormal testing method which is combine clustering analysis and HMM. This method doesnt need any training data set of manual marking; it can explore many different types of invading behaviors. The experimental results indicate that this method has better effect on the testing, which is of a higher testing rate and lower error report rate.
456
Abstract: In this paper, a robust channel estimation scheme is proposed for the OFDM based wireless local area network systems. The proposed channel estimation scheme has been done targeting the IEEE 802.11a standard [, but it can be extended to other packet-based OFDM systems. A robust channel estimation scheme is proposed for the OFDM-based wireless local area network systems. Performance evaluation shows that the WLAN system with the proposed channel estimation scheme is with practical system performance under harsh fading channel.
462
Abstract: This paper presents an object-event mechanism based overlay network simulation experimental platform (ONSP). The platform adopts object-oriented approaches to provide an effective application-layer active network simulation method. The method abstracts network elements, simulates the change of system performance through parameters setting, and introduces users session triggered by event. This strategy conducts experiments avoiding unnecessary construction of actual physical network, so that to save the cost of the experiment and to make mass network tests possible. At another time, the platform has established a complete performance evaluation model, and can synthetically measure the relative performance of variety of services to ensure the accuracy of test results. The productions in this paper will provide important support to overlay network services technology, QoS-assure technology, and applications of distributed multimedia systems.
468
Abstract: In the modern information technologies, cloud computing is the most popular. However, the security problems in the application of the cloud databases should be never ignored. In this paper, the characteristics of cloud computing database are first introduced, and then the potential security problems as well as solutions in the application of cloud database are analyzed.
473
Abstract: Cloud storage, data storage means occurring in recent years is based on cloud computing technology. It is the inevitable trend of data storage in the future. The article describes the definition and characteristics of cloud computing and design a generic cloud computing architecture, given its storage technology for cloud computing, cloud storage system architecture model. At last, the paper prospects the tendency of cloud computing and its storage technology.
477
Abstract: This paper focus on and study the data acquisition problems of wireless sensor, use low power MOTE node to design the hardware platform, on this foundation discuss maximum life cycle problem of the wireless sensor network data collection process, use the mathematical description of the method for solving the data flow process, present maximum production cycle analysis method in no data polymerization conditions, further, our experimental results show that our solution. The experiment shows that this scheme is more optimized and the data life cycle of the wireless network has improved greatly.
482
Abstract: An Efficient Routing Algorithm for Improving the QoS in Internet has been proposed and presented in this paper. The algorithm is a kind of Multi Constrained Path algorithm. The routing take place based on more than one link weight components. To avoid the NP complete problem and to increase the computational efficiency some advancement are added. These include the definition of Non Linear Path Length, where the sub paths may not be the shortest path, having k no of shortest paths in a node instead of having only the shortest path, then removing the path dominancy for state space reduction. As a last the concept look ahead is also included through which a predicted path to destination is mapped. This work only implements the removal of path dominancy where the queue is updated by removing the dominated paths from the queue. The simulation is also showing the better performance of the system.
487
Abstract: Android is a standard and popular platform of various smart phone. Security thread is a major problem to smart phone. File system event monitoring is essential for many types of programs ranging from file managers to security tools. In this paper, we make research on file system event monitoring. Our approach involves file nodes monitor by Android API and Linux native system call. We compare different features between them. It shows that each method has its benefit and limitation. Linux system calls method outperforms API in flexibility and scalability. But it has its un-convenience to user for its page alignment. A comprehensive method is proposed to take advantage of significant performance gains.
494