It is concluded that Communicative Language Teaching(CLT) is a more practical approach to develop communication ability. In the process of applying this approach on oral communication ability, techniques based on CLT ...It is concluded that Communicative Language Teaching(CLT) is a more practical approach to develop communication ability. In the process of applying this approach on oral communication ability, techniques based on CLT are explored and classified as structured output activities and communicative output activities.展开更多
Nowadays, the world is frequently referred to as the “information world”. Companies rely on knowledge to differentiate themselves and get a competitive advantage. As a result, businesses pay close attention to knowl...Nowadays, the world is frequently referred to as the “information world”. Companies rely on knowledge to differentiate themselves and get a competitive advantage. As a result, businesses pay close attention to knowledge management and devote a significant amount of time and resources to ensuring that knowledge is appropriately owned and exploited. Individual knowledge transfer is also a factor. The paper examines knowledge transfer and sharing, with the goal of determining the most effective internal communication tool for information transfer. The research findings should aid company management in organizing internal communication in a way that allows them to carry out their knowledge management plan.展开更多
Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by...Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by passively analyzing the patterns of encrypted traffic at the Tor client side. However, HTTP pipeline and Tor circuit multiplexing techniques can affect the accuracy of the attack by mixing the traffic that carries web objects in a single TCP connection. In this paper, we propose a novel active website fingerprinting attack by identifying and delaying the HTTP requests at the first hop Tor node. Then, we can separate the traffic that carries distinct web objects to derive a more distinguishable traffic pattern. To fulfill this goal, two algorithms based on statistical analysis and objective function optimization are proposed to construct a general packet delay scheme. We evaluate our active attack against Tor in empirical experiments and obtain the highest accuracy of 98.64%, compared with 85.95% of passive attack. We also perform experiments in the open-world scenario. When the parameter k of k-NN classifier is set to 5, then we can obtain a true positive rate of 90.96% with a false positive rate of 3.9%.展开更多
文摘It is concluded that Communicative Language Teaching(CLT) is a more practical approach to develop communication ability. In the process of applying this approach on oral communication ability, techniques based on CLT are explored and classified as structured output activities and communicative output activities.
文摘Nowadays, the world is frequently referred to as the “information world”. Companies rely on knowledge to differentiate themselves and get a competitive advantage. As a result, businesses pay close attention to knowledge management and devote a significant amount of time and resources to ensuring that knowledge is appropriately owned and exploited. Individual knowledge transfer is also a factor. The paper examines knowledge transfer and sharing, with the goal of determining the most effective internal communication tool for information transfer. The research findings should aid company management in organizing internal communication in a way that allows them to carry out their knowledge management plan.
基金partially supported by the National Key R&D Program of China(No.2017YFB1003000)the National Natural Science Foundation of China(Nos.61572130,61320106007,61632008,61502100,61532013,and 61402104)+3 种基金the Jiangsu Provincial Natural Science Foundation(No.BK20150637)the Jiangsu Provincial Key Technology R&D Program(No.BE2014603)the Qing Lan Project of Jiangsu Province,Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201)the Key Laboratory of Computer Network and Information Integration of the Ministry of Education of China(No.93K-9)
文摘Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by passively analyzing the patterns of encrypted traffic at the Tor client side. However, HTTP pipeline and Tor circuit multiplexing techniques can affect the accuracy of the attack by mixing the traffic that carries web objects in a single TCP connection. In this paper, we propose a novel active website fingerprinting attack by identifying and delaying the HTTP requests at the first hop Tor node. Then, we can separate the traffic that carries distinct web objects to derive a more distinguishable traffic pattern. To fulfill this goal, two algorithms based on statistical analysis and objective function optimization are proposed to construct a general packet delay scheme. We evaluate our active attack against Tor in empirical experiments and obtain the highest accuracy of 98.64%, compared with 85.95% of passive attack. We also perform experiments in the open-world scenario. When the parameter k of k-NN classifier is set to 5, then we can obtain a true positive rate of 90.96% with a false positive rate of 3.9%.