期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
浅析OSPF协议的算法 被引量:5
1
作者 盛伟 《科技创新与应用》 2015年第19期95-95,共1页
OSPF是开放最短路径优先路由协议,它是一种链路状态型路由协议,功能强大,负载小,通过自身维持的数据链路状态库计算路由表,收敛时间短,工作效率高,基于分层的网络规划可以在中型、大型网络规模中使用,OSPF支持MD5验证,在路由器相互交换... OSPF是开放最短路径优先路由协议,它是一种链路状态型路由协议,功能强大,负载小,通过自身维持的数据链路状态库计算路由表,收敛时间短,工作效率高,基于分层的网络规划可以在中型、大型网络规模中使用,OSPF支持MD5验证,在路由器相互交换信息中的安全性得到保障,是大型网络规划时的首选。 展开更多
关键词 OSPF 状态机 链路状态算法 协议 Virtual—link
下载PDF
Admission Control of VL in AFDX Under HRT Constraints 被引量:3
2
作者 ZHOU Qiang QU Zhenliang LIN Hengqing 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2011年第2期195-201,共7页
Avionics full duplex switched ethernet(AFDX) is a switched interconnection technology developed to provide reliable data exchange with strong data transmission time guarantees in internal communication of the spacec... Avionics full duplex switched ethernet(AFDX) is a switched interconnection technology developed to provide reliable data exchange with strong data transmission time guarantees in internal communication of the spacecraft or aircraft.Virtual link(VL) is an important concept of AFDX to meet quality of service(QoS) requirements in terms of end-to-end message deadlines.A VL admission control algorithm in AFDX network under hard real-time(HRT) constraints is studied.Based on the scheduling prin-ciple of AFDX protocol,a packet scheduling scheme under HRT constraints is proposed,and after that an efficient VL admission control algorithm is presented.Analytical proof that the algorithm can effectively determine whether VL should be admitted is given.Finally simulative examples are presented to promote the conclusion. 展开更多
关键词 AVIONICS avionics full duplex switched ethernet virtual link SWITCH hard real-time admission control
原文传递
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
3
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部