-
1901
Identity-based encryption scheme against adaptive leakage
Published 2012-07-01“…In allusion to the problem that scheme resilient to adaptive leakage was lacked in identity-based encryption,a notion of entropic leakage-resilient was used to define the security against adaptive leakage in IBE.Then by using identity-based hash proof system and extractors,an adaptive-leakage secure IBE scheme was proposed.And for instantiation,an IBE scheme against adaptive leakage based on q-TABDHE assumption was constructed.Security analysis shows that the scheme achieves chosen-plaintext attack security,and it can not only resist adaptive leakage effectively,but also tolerate more key leakage.…”
Get full text
Article -
1902
Evaluation model for topology partition base on simulation run time
Published 2013-06-01“…Firstly,by analyzing the PDES mechanism,a variety of factors affecting simulation performance were summa-rized and classified,and the factor set influenced by topology partition result was found out; and then,by analyzing simulation run time,an evaluation model for topology partition was presented.The DDoS attack experiment results and model calculations are basically consistent in PDNS environment,and this proves the accuracy of the model.At last,by evaluating METIS algorithm and subnet elimination algorithm,the former algorithm has higher evaluation than the latter,by about 14%.The experimental results accord with the expectations,and prove the effectiveness of the model.…”
Get full text
Article -
1903
Whiteflies on Landscape Ornamentals
Published 2013-04-01“…The most frequently attacked plants include allamanda, avocado, chinaberry, citrus, fig, fringe tree, gardenia, gumbo limbo, ligustrum, mango, various palms, persimmon, viburnum, and many annuals. …”
Get full text
Article -
1904
A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability
Published 2016-03-01“…XSS vulnerability is a common vulnerability of attacking the Web application and getting the user’s privacy data.Traditional XSS vulnerability detection’s softwares aren’t specially detecting for AJAX Web application.There is a huge disparity in the inspection accuracy.According to this situation,the XSS vulnerability characteristics of AJAX Web applications were described in detail,and a dynamic detection method based on Web crawler and page code behavior was proposed.Experimental results show that the proposed method has good performance in labor-saving,time saving and vulnerability detection effect.…”
Get full text
Article -
1905
A Coconut Mite, Aceria guerreronis Keifer (Arachnida: Acari: Eriophyidae)
Published 2007-03-01“…Howard and Dave Moore, describes one of the worst arthropod pests of coconut palms, which attacks the young fruits and can cause scarring and distortion and premature fruit drop. …”
Get full text
Article -
1906
Systemic Lupus Erythematosus (SLE): A review on the prevalence, clinical manifestation, and disease assessment
Published 2020-09-01“…This disease occurs when the body’s tissues are attacked by its own immune system. The aetiology of SLE is not fully understood, but both genetic predisposition and ecological triggers are thought to be involved in the disease manifestation. …”
Get full text
Article -
1907
Life Cycle of the Lesser Cornstalk Borer in Sugarcane
Published 2011-10-01“…The lesser cornstalk borer attacks a large number of crops but is a potentially serious pest of sugarcane. …”
Get full text
Article -
1908
Fastly match threat response policies based on interval decision diagram
Published 2021-05-01“…Due to the inaccuracy of threat detection and the scale of response policies, it is very difficult to accurately select response policies.To address the above problem, fuzzy interval decision diagram to quickly match response policy was proposed.Firstly, the response policy was formally and fuzzily defined.Considering threat type, threat level, attack frequency and propagation mode, an algorithm with fuzzy operator was designed to construct interval decision diagram.Further, a fuzzy match algorithm was proposed to quickly select response policies.Experimental results show the efficiency of the proposed approach.…”
Get full text
Article -
1909
New data fusion model of intrusion detection——IDSFP
Published 2006-01-01“…Based on multi-sensor data fusion technology,a new intrusion detection data fusion model-IDSFP was pre-sented.The model was characterized by correlating and merging alerts of different types of IDS,generating the measures of the security situation,thus constituting the evidence.Current security situation of network was evaluated by applying the D-S evidence theory,and various IDS of network were adjusted dynamically to strengthen the detection of the data which relates to the attack attempt.Consequently,the false positive rate and the false negative rate are effectively reduced,and the detection efficiency of IDS is accordingly improved.…”
Get full text
Article -
1910
Review of path branch obfuscation
Published 2020-04-01“…Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path branch obfuscation was proposed to defeat symbolic execution.With the composition of branch information and how does the branch composition effect in execution technique,the branch obfuscation was classified into three types.Then,a detailed research and development situation of each branch obfuscation class was exhaustively described.At last,the prospects of branch obfuscation were discussed.…”
Get full text
Article -
1911
Trustworthy network based on blockchain technology
Published 2019-10-01“…With the frequent occurrence of network security issues,the industry had not satisfied the patch-based external security solution,and it was hoped that the endogenous security could be realized from the network architecture layer.The decentralized trustworthy network architecture was proposed.Based on the research of the security of existing network underlying protocol,a trustworthy network architecture based on decentralization technology was proposed,such as blockchain technology,which could effectively solve the problem of lack of endogenous security in existing networks.Layers implement network security to avoid malicious network attacks or network failures caused by configuration errors.…”
Get full text
Article -
1912
Analysis of entropy on the European markets of energy and energy commodities prices.
Published 2025-01-01“…The paper analyzes the problem of entropy in the moments of transition from a normal economic situation (2015-2019) to the Pandemic period (2020-2021) and the period of Russia's attack on Ukraine (2022-2023). The research in the article is based on the analysis of electricity, oil, coal, and gas prices in 27 countries of the European Union and Norway. …”
Get full text
Article -
1913
Study of relationships between correlation-immunity and balanceness based on Boolean functions
Published 2010-01-01“…E-derivative and derivative were introduced to deeply study internal structure of Boolean function,and analyzed the cryptographic properties of Boolean function,which was a new subject in cryptology.The relationships between correlation-immunity and balanceness was analyzed,and obtain some important results which could not be obtained by analyzing the exterior structure of Boolean function at all.Beyond that,for researching on the correlation immunity of balanced H-Boolean function which play a important role in cryptology,here also give a new research methods to improve the anti-attack ability of cryptosystem.…”
Get full text
Article -
1914
Mechanism of Lower Airway Hyperresponsiveness Induced by Allergic Rhinitis
Published 2022-01-01“…Most patients with allergic rhinitis also have lower airway hyperresponsiveness, and an allergic rhinitis attack can increase lower airway hyperresponsiveness. …”
Get full text
Article -
1915
Protocol security enhancement on secondary system of smart substation
Published 2015-12-01“…With the wide application of smart substation communication protocol IEC6150 and Smart Grid,IEC61850 safety issue has become a problem can't be ignored.Combined with IEC62351,in the internal of substation as a whole,from authentication,encrypted communications,anti-replay attack,key distribution,the communication protocol security enhancement with in side of the substation which included MMS,GOOSE and SMV protocol was studied.Encrypted packet analysis technology was discussed.Combined with the test equipment run conditions,the performance caused by protocol security enhancement equipment was analyzed.…”
Get full text
Article -
1916
Tobacco Budworm, Heliothis virescens (Fabricius) (Insecta: Lepidoptera: Noctuidae)
Published 2012-10-01“…It is principally a field crop pest, attacking such crops as alfalfa, clover, cotton, flax, soybean, and tobacco. …”
Get full text
Article -
1917
POSTMODERNISM AND POSITIVISM
Published 1998-01-01“… Positivism is a favorite object of postmodernist attacks. With an interesting exception, namely Hume, it is regarded by postmodernists as an embodiment of everything what is the worst in the Spirit of Enlightenment: its emphasis on wholeness, unity, and unequivocalness of knowledge. …”
Get full text
Article -
1918
A Function Private Attribute-Based Encryption
Published 2014-01-01“…Hence, using this system can efficiently resist keyword guessing attack.…”
Get full text
Article -
1919
Paul Auster’s Post-9/11 Writing
Published 2020-06-01“…This essay sets out to explore Paul Auster’s various responses to the terrorist attacks, found in his works of fiction and nonfiction, in order to unveil their complex connections with world history and representation. …”
Get full text
Article -
1920
Secure Pesticide Storage: Security Against Terrorist Threats
Published 2005-06-01“… Many farmers and managers of pesticide storage facilities had concerns about biosecurity and agroterrorism even before the Oklahoma City bombing and the September 11, 2001 terrorist attacks on our nation. Businesses that manufacture, reformulate, sell, distribute, transport, store, or apply pesticides have long known the mitigation steps for safety of their workers, customers and communities. …”
Get full text
Article