Applied Mechanics and Materials Vols. 631-632

Paper Title Page

Abstract: manufacturing e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. Then analyzes the manufacturing actualities of small and medium-scale corporations and puts forward the industrial product quality long-distance testing and pre-evaluating expert system based on network.
932
Abstract: Due to irregular information flow for NCS (Networked Control System), network delay has performance of random and variability. It reduces system stability, network performance and control performance. This paper focuses on research of predictive algorithm of network delay. Network delay data is obtained in PROFIBUS-DP. Based on network delay data, the ARMA (Auto-Regressive and Moving Average) model of delay is set up. The parameter estimation algorithm of Robust Kalman is used to estimate parameters of proposed ARMA model of network delay. A simulation example is given and verifies efficiency of predictive algorithm proposed.
937
Abstract: Recently there has been a new kind of attacks, browser-based attacks, against anonymous communication systems, such as Tor. This kind of attacks exploits JavaScript in the browser or the HTML meta refresh to generate some predefined signals to correlate users and their visited websites. A novel and efficient defense against such attacks is proposed in this paper. Our main observation is that the attacker must generate enough signals from the client site (the browser) to correlate the user and the website while we can detect the attack at the client site. More specifically, when a user is browsing a specific website and a browser-based attack is in progress, the number of outgoing flows and the total byte counts generated by the browser should be much larger compared with the normal browsing behavior. So we can set up fingerprints (number of outgoing flows and total byte counts) for normal browsing of web pages for a period of time and utilize these fingerprints to detect browser-based attacks. We have also found that some JavaScript codes must be executed many times if the attacker uses JavaScript to communicate. We have modified the Mozilla Firefox JavaScript engine to audit execution times of JavaScript code to defend these attacks, including browser-based attacks.
941
Abstract: For traditional intrusion detection technology, the lack of intelligent and self-adaptive has become increasingly prominent when they cope with unknown attacks. A method based on genetic algorithm was presented for discovering and learning the intrusion detection rules. This algorithm uses the network data packet as an original data source, after pretreatment, initialized them to be the initial population of the genetic algorithm, then derive the classification rules. These rules were used to detect or classify network intrusions in a real-time network environment, selecting the intrusion packets. The experiment proves the efficiency of the presented method.
946
Abstract: This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights. Security analysis shows that the authentication, integrity, confidentiality, and impartiality of the program are well guaranteed.
952
Abstract: The development of computer and network technology greatly make changes in current society and our life. It affects daily life, study, work as well as scientific research. Internet itself is open and unrestricted, which becomes a much complex running environment due to gradual expansion and feasibility of all kinds of network applications. Meanwhile, network confronts security threats coming from different paths. It is utmost important for the network designer and manager to protect and secure the running network. Campus network that connects to the internet performs information exchange and communication on teaching, research work and so on. It also consider as an indispensable facility of college. The securities of network often suffer threats because of its special utilizations. In order to establish and maintain an effective and high security network, the efficient procedures, methods and strategies seem to be very imperative in modern campus network.
958
Abstract: With the rapid development of information technology, there are more and more computer rooms with power consumption. In this paper, we study the main problem that the present status of high energy consumption in data centers, we put forward the room resource dynamic scheduling problem. According to the approximate dynamic programming ideas of modeling room resource dynamic scheduling model is established, to solve the problem of heuristic rules. To meet the demand of the outside world, it reduces the condition of lower energy consumption, making for a period of time to achieve maximum room revenue.
962
Abstract: The reasons interfering LTE network are analyzed. Combining with the actual data of existing commercial LTE network, RF optimization scheme of LTE network to suppress the interference is promoted. According to the data released by road test, the proposed RF optimization scheme can improve the network coverage and network performance, and can play a reference role to other similar cases.
966
Abstract: This paper proposes an evaluation method based on fuzzy analytic hierarchy process (FAHP) for network security risk assessment. The paper analyzes the network security risk factors. By paired comparison of the importance of factors, the interval number fuzzy complementary judgment matrix is established to get the weight vectors of interval numbers of the factors. Then, by comparing the weight vectors of interval numbers, a possibility degree matrix is established, and then the weight coefficient of each factor are obtained. Finally the sorting result of the network security risk factors is presented. Instances show that the method is feasible and effective and it provides a reliable basis for security risk control strategy of network security staff.
971
Abstract: The immunization strategy to halt virus is an important topic in epidemic spreading research. In this paper, we extend our seasonal epidemics immunization model on correlated networks. We apply numerical results of our model on different kinds of networks. We first investigate the relationship between epidemic prevalence and epidemic season. We find that the immunization performs best on negative correlated network, and give an explanation. We also present the result of epidemic prevalence with different vaccinating proportion and epidemic spreading probability.
976

Showing 191 to 200 of 295 Paper Titles