期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Linear Pulse-Coupled Oscillators Model¬—A New Approach for Time Synchronization in Wireless Sensor Networks 被引量:4
1
作者 zhulin An hongsong zhu +3 位作者 Meilin Zhang Chaonong Xu Yongjun Xu Xiaowei Li 《Wireless Sensor Network》 2010年第2期108-114,共7页
Mutual synchronization is a ubiquitous phenomenon that exists in various natural systems. The individual participants in this process can be modeled as oscillators, which interact by discrete pulses. In this paper, we... Mutual synchronization is a ubiquitous phenomenon that exists in various natural systems. The individual participants in this process can be modeled as oscillators, which interact by discrete pulses. In this paper, we analyze the synchronization condition of two- and multi-oscillators system, and propose a linear pulse-coupled oscillators model. We prove that the proposed model can achieve synchronization for almost all conditions. Numerical simulations are also included to investigate how different model parameters affect the synchronization. We also discuss the implementation of the model as a new approach for time synchronization in wireless sensor networks. 展开更多
关键词 SYNCHRONIZATION Biologically Inspired ALGORITHMS Pulse-Coupled Oscillators WIRELESS Sensor Networks
下载PDF
Social engineering in cybersecurity:a domain ontology and knowledge graph application examples 被引量:4
2
作者 Zuoguang Wang hongsong zhu +1 位作者 Peipei Liu Limin Sun 《Cybersecurity》 EI CSCD 2021年第1期480-500,共21页
Social engineering has posed a serious threat to cyberspace security.To protect against social engineering attacks,a fundamental work is to know what constitutes social engineering.This paper first develops a domain o... Social engineering has posed a serious threat to cyberspace security.To protect against social engineering attacks,a fundamental work is to know what constitutes social engineering.This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application.The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain,together with 22 kinds of relations describing how these entities related to each other.It provides a formal and explicit knowledge schema to understand,analyze,reuse and share domain knowledge of social engineering.Furthermore,this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios.7 knowledge graph application examples(in 6 analysis patterns)demonstrate that the ontology together with knowledge graph is useful to 1)understand and analyze social engineering attack scenario and incident,2)find the top ranked social engineering threat elements(e.g.the most exploited human vulnerabilities and most used attack mediums),3)find potential social engineering threats to victims,4)find potential targets for social engineering attackers,5)find potential attack paths from specific attacker to specific target,and 6)analyze the same origin attacks. 展开更多
关键词 Social engineering attack Cyber security Ontology Knowledge graph Attack scenarios Threat analysis Attack path Attack model TAXONOMY Composition and structure
原文传递
Towards IP geolocation with intermediate routers based on topology discovery
3
作者 Zhihao Wang Hong Li +3 位作者 Qiang Li Wei Li hongsong zhu Limin Sun 《Cybersecurity》 CSCD 2019年第1期225-238,共14页
IP geolocation determines geographical location by the IP address of Internet hosts.IP geolocation is widely used by target advertising,online fraud detection,cyber-attacks attribution and so on.It has gained much mor... IP geolocation determines geographical location by the IP address of Internet hosts.IP geolocation is widely used by target advertising,online fraud detection,cyber-attacks attribution and so on.It has gained much more attentions in these years since more and more physical devices are connected to cyberspace.Most geolocation methods cannot resolve the geolocation accuracy for those devices with few landmarks around.In this paper,we propose a novel geolocation approach that is based on common routers as secondary landmarks(Common Routers-based Geolocation,CRG).We search plenty of common routers by topology discovery among web server landmarks.We use statistical learning to study localized(delay,hop)-distance correlation and locate these common routers.We locate the accurate positions of common routers and convert them as secondary landmarks to help improve the feasibility of our geolocation system in areas that landmarks are sparsely distributed.We manage to improve the geolocation accuracy and decrease the maximum geolocation error compared to one of the state-of-the-art geolocation methods.At the end of this paper,we discuss the reason of the efficiency of our method and our future research. 展开更多
关键词 IP geolocation Network topology discovery Web landmarks Relative latency Statistical learning
原文传递
Towards IP geolocation with intermediate routers based on topology discovery
4
作者 Zhihao Wang Hong Li +3 位作者 Qiang Li Wei Li hongsong zhu Limin Sun 《Cybersecurity》 2018年第1期500-513,共14页
IP geolocation determines geographical location by the IP address of Internet hosts.IP geolocation is widely used by target advertising,online fraud detection,cyber-attacks attribution and so on.It has gained much mor... IP geolocation determines geographical location by the IP address of Internet hosts.IP geolocation is widely used by target advertising,online fraud detection,cyber-attacks attribution and so on.It has gained much more attentions in these years since more and more physical devices are connected to cyberspace.Most geolocation methods cannot resolve the geolocation accuracy for those devices with few landmarks around.In this paper,we propose a novel geolocation approach that is based on common routers as secondary landmarks(Common Routers-based Geolocation,CRG).We search plenty of common routers by topology discovery among web server landmarks.We use statistical learning to study localized(delay,hop)-distance correlation and locate these common routers.We locate the accurate positions of common routers and convert them as secondary landmarks to help improve the feasibility of our geolocation system in areas that landmarks are sparsely distributed.We manage to improve the geolocation accuracy and decrease the maximum geolocation error compared to one of the state-of-the-art geolocation methods.At the end of this paper,we discuss the reason of the efficiency of our method and our future research. 展开更多
关键词 IP geolocation Network topology discovery Web landmarks Relative latency Statistical learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部