期刊文献+
共找到110篇文章
< 1 2 6 >
每页显示 20 50 100
A survey of social network and information dissemination analysis 被引量:7
1
作者 binxing Fang Yan Jia +2 位作者 Yi Han Shasha Li Bin Zhou 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4163-4172,共10页
In recent years,with the rapid growth of social network services(SNS),social networks pervade nearly every aspect of our daily lives.Social networks are influencing today’s societal and cultural issues,and changing t... In recent years,with the rapid growth of social network services(SNS),social networks pervade nearly every aspect of our daily lives.Social networks are influencing today’s societal and cultural issues,and changing the way of people seeing themselves.To fully understand the running mechanisms of social networks,in this paper,we aim at series of high knitted and important elements of online social networks.We mainly focus on 3 important but also open research problems,they are(1)structural properties and evolving laws,(2)social crowds and their interaction behaviors and(3)information and its diffusion.In this paper,we review the related work on the 3 problems.Then,we briefly introduce some interesting research directions and our progress on these research problems. 展开更多
关键词 网络服务 信息传播 社交 文化问题 接近开关 运行机制 组成部分 结构特性
原文传递
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective 被引量:4
2
作者 Yuan SU Xi ZHANG +2 位作者 Lixin LIU Shouyou SONG binxing FANG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第3期518-531,共14页
Social networks are fundamental media for dif- fusion of information and contagions appear at some node of the network and get propagated over the edges. Prior re- searches mainly focus on each contagion spreading ind... Social networks are fundamental media for dif- fusion of information and contagions appear at some node of the network and get propagated over the edges. Prior re- searches mainly focus on each contagion spreading indepen- dently, regardless of multiple contagions' interactions as they propagate at the same time. In the real world, simultaneous news and events usually have to compete for user's attention to get propagated. In some other cases, they can cooperate with each other and achieve more influences. In this paper, an evolutionary game theoretic framework is proposed to model the interactions among multiple con- tagions. The basic idea is that different contagions in social networks are similar to the multiple organisms in a popula- tion, and the diffusion process is as organisms interact and then evolve from one state to another. This framework statis- tically learns the payoffs as contagions interacting with each other and builds the payoff matrix. Since learning payoffs for all pairs of contagions IS almost impossible (quadratic in the number of contagions), a contagion clustering method is proposed in order to decrease the number of parameters to fit, which makes our approach efficient and scalable. To ver- ify the proposed framework, we conduct experiments by us- ing real-world information spreading dataset of Digg. Exper- imental results show that the proposed game theoretic frame- work helps to comprehend the information diffusion process better and can predict users' forwarding behaviors with more accuracy than the previous studies. The analyses of evolution dynamics of contagions and evolutionarily stable strategy re- veal whether a contagion can be promoted or suppressed by others in the diffusion process. 展开更多
关键词 social networks information diffusion gametheory evolutionary game evolution dynamics
原文传递
Prison Term Prediction on Criminal Case Description with Deep Learning 被引量:3
3
作者 Shang Li Hongli Zhang +4 位作者 Lin Ye Shen Su Xiaoding Guo Haining Yu binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1217-1231,共15页
The task of prison term prediction is to predict the term of penalty based on textual fact description for a certain type of criminal case.Recent advances in deep learning frameworks inspire us to propose a two-step m... The task of prison term prediction is to predict the term of penalty based on textual fact description for a certain type of criminal case.Recent advances in deep learning frameworks inspire us to propose a two-step method to address this problem.To obtain a better understanding and more specific representation of the legal texts,we summarize a judgment model according to relevant law articles and then apply it in the extraction of case feature from judgment documents.By formalizing prison term prediction as a regression problem,we adopt the linear regression model and the neural network model to train the prison term predictor.In experiments,we construct a real-world dataset of theft case judgment documents.Experimental results demonstrate that our method can effectively extract judgment-specific case features from textual fact descriptions.The best performance of the proposed predictor is obtained with a mean absolute error of 3.2087 months,and the accuracy of 72.54%and 90.01%at the error upper bounds of three and six months,respectively. 展开更多
关键词 Neural networks prison term prediction criminal case text comprehension
下载PDF
Structure-independent disaster recovery:Concept,architecture and implementations 被引量:3
4
作者 ZHENG WeiMin FANG binxing 《Science in China(Series F)》 2009年第5期813-823,共11页
Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods ... Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods are structure-dependent. It is hard to share the DR resources between different DR systems, which made it expensive. We present a structure-independent disaster recovery theory and its implementation methods in this paper. By backup the whole system but not just the data, the goal of device and application-independent disaster recovery has been achieved. We further present a parallel recovery model and an on demand data retrieval method based on the theory. Some implementation details of prototype recovery system are also discussed. With the methods independent from specific devices or applications, the cost of disaster recovery infrastructure can be essentially reduced by resource sharing. Experiments show that the recovery time has also been greatly shortened with little service degradation. 展开更多
关键词 disaster recovery PARALLEL VIRTUALIZATION
原文传递
Geometric Name Routing for ICN in Dynamic World 被引量:3
5
作者 SUN Yanbin ZHANG Yu +2 位作者 SU Shen ZHANG Hongli FANG binxing 《China Communications》 SCIE CSCD 2015年第7期47-59,共13页
A new paradigm of scalable routing for ICN is to combine a geometric routing scheme with a Distributed Hash Table. However, for most routing schemes in this paradigm, when a node joins or leaves, large numbers of node... A new paradigm of scalable routing for ICN is to combine a geometric routing scheme with a Distributed Hash Table. However, for most routing schemes in this paradigm, when a node joins or leaves, large numbers of nodes, even the whole topology, need to be re-embedded, and a great number of contents need to be re-registered. In this paper, we propose D-Griffin, a geometric routing scheme on flat names for dynamic topologies. D-Griffin provides two advantages. First, it avoids re-embedding the topology by using an online greedy embedding scheme and a void handling greedy forwarding scheme. Second, it decreases the number of re-registrations by using a name mapping scheme with a tradeoff between topology independence and load balancing. Theoretical and experimental analyses show that D-Griffin provides guaranteed content lookup, low description complexity, low path stretch, scalable routing update, and acceptable load balancing. 展开更多
关键词 geometric name routing online greedy embedding name mapping flat name
下载PDF
The New Frontiers of Cybersecurity 被引量:3
6
作者 binxing Fang Kui Ren Yan Jia 《Engineering》 2018年第1期1-2,共2页
Security technology is a special kind of companion technology that is developed for the underlying applications it serves. It is becoming increasingly critical in today's society, as these underlying applications bec... Security technology is a special kind of companion technology that is developed for the underlying applications it serves. It is becoming increasingly critical in today's society, as these underlying applications become more and more interconnected, pervasive, and intelligent. In recent years, we have witnessed the prolifera- tion of cutting-edge computing and information technologies in a wide range of emerging areas, such as cloud computing. 展开更多
关键词 The NEW FRONTIERS CYBERSECURITY
下载PDF
Investigation of distribution uniformity of distributor for biogas slurry application based on CFD analysis 被引量:2
7
作者 Jingjing Fu Yongsheng Chen +4 位作者 binxing Xu Biao Ma Pengjun Wang Aibing Wu Mingjiang Chen 《International Journal of Agricultural and Biological Engineering》 SCIE CAS 2023年第1期45-52,F0003,共9页
A horizontal distributor for biogas slurry application was proposed to explore the distribution performance through CFD analysis and verified by field test.The rheological properties of biogas slurry were analyzed at ... A horizontal distributor for biogas slurry application was proposed to explore the distribution performance through CFD analysis and verified by field test.The rheological properties of biogas slurry were analyzed at first,and key parameters were obtained for the next simulation.The effects of distribution modes,inlet direction,and outlets number on the velocity distribution of flow field and mass flow rate of the horizonal distributor were investigated by CFD simulations.Results of rheological properties indicated that biogas slurry was a non-Newtonian fluid and exhibited shear-thinning behavior.It can be well described by power-law model.The simulation results showed that the geometry of rotor,especially the block numbers was the main factor that determining the fluid movement and trajectory of distribution and output.The mode rotor 1 with two blocks reached the lowest variable coefficient of mass flow rate(4.49%),indicating a higher degree of uniformity.The upward inlet direction would obtain less dead zone,and the distributor with an even outlets number would possess more uniform distribution and less dead zone.The field test of the distributor with rotor 1,upward inlet direction,and 24 outlets has been carried on to verify the simulation results,the variable coefficient of mass flow was 13.06%,which was slightly higher than the simulation(9.23%),but it still within the range of requirement(<15%).The proposed model and the findings of this work are of guiding significance for the study of the utilization technology and equipment of liquid biogas residue. 展开更多
关键词 DISTRIBUTOR biogas slurry distribution uniformity rheological properties CFD
原文传递
Two-Phased Method for Detecting Evasive Network Attack Channels 被引量:2
8
作者 CAO Zigang XIONG Gang +2 位作者 ZHAO Yong GUO Li FANG binxing 《China Communications》 SCIE CSCD 2014年第8期47-58,共12页
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation... With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily. 展开更多
关键词 evasiveencryption SSL X.509detectionnetwork attacks CERTIFICATE ANOMALY
下载PDF
Lightweight Mutual Authentication Scheme for Protecting Identity in Insecure Environment 被引量:2
9
作者 Xu Wu Jin Xu binxing Fang 《China Communications》 SCIE CSCD 2018年第6期158-168,共11页
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ... Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool. 展开更多
关键词 identify authentication light-weight authentication session key agreement user anonymity
下载PDF
Ripple+:An Improved Scheme of Ripple Consensus Protocol in Deployability,Liveness and Timing Assumption 被引量:1
10
作者 Chuanwang Ma Yu Zhang +3 位作者 binxing Fang Hongli Zhang Yidong Jin Dasheng Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第1期463-481,共19页
Ripple acts as a real-time settlement and payment system to connect banks and payment providers.As the consensus support of the Ripple network to ensure network consistency,Ripple consensus protocol has been widely co... Ripple acts as a real-time settlement and payment system to connect banks and payment providers.As the consensus support of the Ripple network to ensure network consistency,Ripple consensus protocol has been widely concerned in recent years.Compared with those Byzantine fault tolerant protocols,Ripple has a significant difference that the system can reach an agreement under decentralized trust model.However,Ripple has many problems both in theory and practice,which arementioned in the previous researches.This paper presents Ripple+,an improved scheme of Ripple consensus protocol,which improves Ripple fromthree aspects:(1)Ripple+employs a specific trustmodel and a corresponding guideline for Unique Node List selection,which makes it easy to deploy in practice to meet the safety and liveness condition;(2)the primary and viewchangemechanismare joined to solve the problem discussed by the previous research that Ripple may lose liveness in some extreme scenarios;(3)we remove the strong synchrony clock and timeout during consensus periods to make it suitable for weak synchrony assumption.We implemented a prototype of Ripple+and conducted experiments to show that Ripple+can achieve the throughput of tens of thousands of transactions per second with no more than half a minute latency,and the view change mechanism hardly incurs additional cost. 展开更多
关键词 RIPPLE CONSENSUS decentralized trust byzantine fault tolerant protocol
下载PDF
Predictive modeling of 30-day readmission risk of diabetes patients by logistic regression,artificial neural network,and EasyEnsemble 被引量:1
11
作者 Xiayu Xiang Chuanyi Liu +2 位作者 Yanchun Zhang Wei Xiang binxing Fang 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2021年第9期417-428,共12页
Objective:To determine the most influential data features and to develop machine learning approaches that best predict hospital readmissions among patients with diabetes.Methods:In this retrospective cohort study,we s... Objective:To determine the most influential data features and to develop machine learning approaches that best predict hospital readmissions among patients with diabetes.Methods:In this retrospective cohort study,we surveyed patient statistics and performed feature analysis to identify the most influential data features associated with readmissions.Classification of all-cause,30-day readmission outcomes were modeled using logistic regression,artificial neural network,and Easy Ensemble.F1 statistic,sensitivity,and positive predictive value were used to evaluate the model performance.Results:We identified 14 most influential data features(4 numeric features and 10 categorical features)and evaluated 3 machine learning models with numerous sampling methods(oversampling,undersampling,and hybrid techniques).The deep learning model offered no improvement over traditional models(logistic regression and Easy Ensemble)for predicting readmission,whereas the other two algorithms led to much smaller differences between the training and testing datasets.Conclusions:Machine learning approaches to record electronic health data offer a promising method for improving readmission prediction in patients with diabetes.But more work is needed to construct datasets with more clinical variables beyond the standard risk factors and to fine-tune and optimize machine learning models. 展开更多
关键词 Electronic health records Hospital readmissions Feature analysis Predictive models Imbalanced learning DIABETES
下载PDF
Theories of Social Media: Philosophical Foundations 被引量:1
12
作者 Jiayin Qi Emmanuel Monod +1 位作者 binxing Fang Shichang Deng 《Engineering》 2018年第1期94-102,共9页
Although many different views of social media coexist in the field of information systems (IS), such the- ories are usually not introduced in a consistent framework based on philosophical foundations, This paper int... Although many different views of social media coexist in the field of information systems (IS), such the- ories are usually not introduced in a consistent framework based on philosophical foundations, This paper introduces the dimensions of lifeworld and consideration of others, The concept of lifeworld includes Descartes' rationality and Heidegger's historicity, and consideration of others is based on instru- mentalism and Heidegger's "being-with," These philosophical foundations elaborate a framework where different archetypal theories applied to social media may he compared: Goffman's presentation of sell Bourdieu's social capital, Sartre's existential project, and Heidegger's "shared-world," While Goffman has become a frequent reference in social media, the three other references are innovative in IS research, The concepts of these four theories of social media are compared with empirical findings in IS literature, While some of these concepts match the empirical findings, some other concepts have not yet been inves- tigated in the use of social media, suggesting future research directions, 展开更多
关键词 Social media LIFEWORLD CONSIDERATION of OTHERS RATIONALITY HISTORICITY lnstrumentalism BEING-WITH Presentation of self
下载PDF
A Review of Data Cleaning Methods for Web Information System 被引量:1
13
作者 Jinlin Wang Xing Wang +2 位作者 Yuchen Yang Hongli Zhang binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1053-1075,共23页
Web information system(WIS)is frequently-used and indispensable in daily social life.WIS provides information services in many scenarios,such as electronic commerce,communities,and edutainment.Data cleaning plays an e... Web information system(WIS)is frequently-used and indispensable in daily social life.WIS provides information services in many scenarios,such as electronic commerce,communities,and edutainment.Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service.In this paper,we present a review of the state-of-the-art methods for data cleaning in WIS.According to the characteristics of data cleaning,we extract the critical elements of WIS,such as interactive objects,application scenarios,and core technology,to classify the existing works.Then,after elaborating and analyzing each category,we summarize the descriptions and challenges of data cleaning methods with sub-elements such as data&user interaction,data quality rule,model,crowdsourcing,and privacy preservation.Finally,we analyze various types of problems and provide suggestions for future research on data cleaning in WIS from the technology and interactive perspective. 展开更多
关键词 Data cleaning web information system data quality rule crowdsourcing privacy preservation
下载PDF
An ICN-Oriented Name-Based Routing Scheme
14
作者 Sun Yanbin Zhang Yu +2 位作者 Zhang Hongli Fang binxing Shi Jiantao 《国际计算机前沿大会会议论文集》 2015年第1期30-32,共3页
Information-Centric Networking (ICN) treat contents as the first class citizens and adopt content names for routing. However, ICN faces challenges of big data. The massive content names and location-independent naming... Information-Centric Networking (ICN) treat contents as the first class citizens and adopt content names for routing. However, ICN faces challenges of big data. The massive content names and location-independent naming bring scalability and efficiency challenges for content addressing. A scalable and efficient name-based routing scheme is a critical component for ICN. This paper proposes a novel Scalable Name-based Geometric Routing scheme, SNGR. To resolve the location-independent names to locations, SNGR utilizes a bi-level sloppy grouping design. To provide scalable location-dependent routing for name resolution, SNGR proposess a universal geometric routing framework. Our theoretical analyses guarantee the performance of SNGR. The experiments by simulation show that SNGR outperformances other similar routing schemes in terms of the scalability of routing table, the reliability to failures, as well as path stretch and latency in name resolution. 展开更多
关键词 name-based ROUTING ROUTING SCALABILITY Information-Centric Networking
下载PDF
A Measurement Study on Resource Popularity and Swarm Evolution of BitTorrent System
15
作者 Majing Su Hongli Zhang +1 位作者 binxing Fang Lin Ye 《International Journal of Communications, Network and System Sciences》 2013年第6期300-308,共9页
Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies ... Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies on BT almost cover each important aspect, little work reflects the recent development of BT system. In this paper, we develop a hybrid measurement system incorporating both active and passive approaches. By exploiting DHT (Distribute Hash Table) and PEX (Peer Exchange) protocols, we collect more extensive information compared to prior measurement systems. Based on the measurement results, we study the resource popularity and swarm evolution with different population in minute/ hour/day scales, and discover that: 1) the resources in BT system appear obvious unbalanced distribution and hotspot phenomenon, in that 74.6% torrents have no more than 1000 peers;2) The lifetime of torrents can be divided into a fast growing stage, a dramatically shrinking stage, a sustaining stage and a slowly fading out stage in terms of swarm population;3) Users’ interest and diurnal periodicity are the main factors that influence the swarm evolution. The former dominates the first two stages, while the latter is decisive in the third stage. We raise an improved peer arrival rate model to describe the variation of the swarm population. Comparison results show that our model outperforms the state-of-the-art approach according to root mean square error and correlation coefficient. 展开更多
关键词 P2P BITTORRENT MEASUREMENT Modeling POPULARITY SWARM EVOLUTION
下载PDF
Web-Based Computing Resource Agent Publishing
16
作者 吴志刚 Fang binxing Hu Mingzeng 《High Technology Letters》 EI CAS 2000年第4期46-49,共4页
Web based Computing Resource Publishing is a efficient way to provide additional computing capacity for users who need more computing resources than that they themselves could afford by making use of idle computing re... Web based Computing Resource Publishing is a efficient way to provide additional computing capacity for users who need more computing resources than that they themselves could afford by making use of idle computing resources in the Web.Extensibility and reliability are crucial for agent publishing. The parent child agent framework and primary slave agent framework were proposed respectively and discussed in detail. 展开更多
关键词 AGENT EXTENSIBILITY RELIABILITY Web-based Computing Resource Publishing
下载PDF
Information Classification and Extraction on Official Web Pages of Organizations
17
作者 Jinlin Wang Xing Wang +3 位作者 Hongli Zhang binxing Fang Yuchen Yang Jianan Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期2057-2073,共17页
As a real-time and authoritative source,the official Web pages of organizations contain a large amount of information.The diversity of Web content and format makes it essential for pre-processing to get the unified at... As a real-time and authoritative source,the official Web pages of organizations contain a large amount of information.The diversity of Web content and format makes it essential for pre-processing to get the unified attributed data,which has the value of organizational analysis and mining.The existing research on dealing with multiple Web scenarios and accuracy performance is insufficient.This paper aims to propose a method to transform organizational official Web pages into the data with attributes.After locating the active blocks in the Web pages,the structural and content features are proposed to classify information with the specific model.The extraction methods based on trigger lexicon and LSTM(Long Short-Term Memory)are proposed,which efficiently process the classified information and extract data that matches the attributes.Finally,an accurate and efficient method to classify and extract information from organizational official Web pages is formed.Experimental results show that our approach improves the performing indicators and exceeds the level of state of the art on real data set from organizational official Web pages. 展开更多
关键词 Web pre-process feature classification data extraction trigger lexicon LSTM
下载PDF
SDFA: a Uniform Model for String Matching Algorithms
18
作者 贺龙涛 Fang +4 位作者 binxing YUN Xiaochun Hu Mingzeng 《High Technology Letters》 EI CAS 2004年第2期34-37,共4页
String matching algorithms play an important role in computer science. However, there is no uniform mathematical model to describe these algorithms. Thus, read-head-Skippable DFA (SDFA) is put forward, which is an ext... String matching algorithms play an important role in computer science. However, there is no uniform mathematical model to describe these algorithms. Thus, read-head-Skippable DFA (SDFA) is put forward, which is an extension of two-way DFA. It is proved that SDFA is equivalent to DFA. Furthermore, SDFA is a more natural mathematical model for string matching algorithms. After that, four types of the movement of the read head of string matching are analyzed and modeled by SDFA. Finally, the SDFA model of BMA string matching algorithms is given. 展开更多
关键词 字符串匹配算法 DFA 2DFA SDFA 首读跳跃确定性有限自动机
下载PDF
Self-Certificating Root:A Root Zone Security Enhancement Mechanism for DNS
19
作者 Wenfeng Liu Yu Zhang +3 位作者 Wenjia Zhang Lu Liu Hongli Zhang binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第4期521-536,共16页
As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hi... As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hierarchical resource authentication architecture,which brings management convenience but places the DNS at risk from a single point of failure.When the root key suffers a leak or misconfiguration,top level domain(TLD)authority cannot independently protect the authenticity of TLD data in the root zone.In this paper,we propose self-certificating root,a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol.By adding the TLD public key and signature of the glue records to the root zone,this mechanism enables the TLD authority to certify the self-submitted data in the root zone and protects the TLD authority from the risk of root key failure.This mechanism is implemented on an open-source software,namely,Berkeley Internet Name Domain(BIND),and evaluated in terms of performance,compatibility,and effectiveness.Evaluation results show that the proposed mechanism enables the resolver that only supports DNS/DNSSEC to authenticate the root zone TLD data effectively with minimal performance difference. 展开更多
关键词 Domain name system root zone security single point of failure
下载PDF
Worm attack detection and response
20
作者 CHEN Bo YU Xiangzhan +1 位作者 FANG binxing YUN Xiaochun 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第4期464-472,共9页
There appear many Internet-scale worm incidents in recent years,which have caused severe damage to the society.It is clear that a simple self-propagation worm can quickly spread across the Internet.Therefore,it is nec... There appear many Internet-scale worm incidents in recent years,which have caused severe damage to the society.It is clear that a simple self-propagation worm can quickly spread across the Internet.Therefore,it is necessary to implement automatic mitigation which can detect worm and drop its packet.In this paper,the worm’s framework was first analyzed and its two characteristics were detected.Based on the two characteristics,a defending algorithm was presented to protect network.Experimental results verify that our algorithm is very effective to constrain the worm propagation and meanwhile it almost does not interfere in normal activity. 展开更多
关键词 wormdetection networkmonitoring connection degree lossy counting
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部