期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
虚拟微电子稿纸
1
作者 李成武 郑春 《电脑知识与技术》 2021年第9期215-217,共3页
针对解决目前对传统稿纸的大量浪费,污染环境的现象问题,也为了让稿纸的利用更加充分,减少纸张的浪费,而研究一款可根据人们的想法消除痕迹也可与手机或电脑进行上传与下载的“使用互动”的稿纸,虚拟微电子稿纸,这是接近于一种电子产品... 针对解决目前对传统稿纸的大量浪费,污染环境的现象问题,也为了让稿纸的利用更加充分,减少纸张的浪费,而研究一款可根据人们的想法消除痕迹也可与手机或电脑进行上传与下载的“使用互动”的稿纸,虚拟微电子稿纸,这是接近于一种电子产品的存在,它有着诸多的优点,包括使用便捷,绿色环保,使用高效等,能满足人们在日常生活中各种用纸的需求。在人们领略电子科技魅力的同时,也能感受到由书写所带来的乐趣。 展开更多
关键词 虚拟微电子稿纸 打破传统 节能环保 创新 无限使用
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
2
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部