期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
1
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
2
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
Numerical modeling of saltwater intrusion
3
《Global Geology》 1998年第1期88-89,共2页
关键词 Numerical modeling of saltwater intrusion
下载PDF
Quantitative Analysis of Multi-Recovery-Based Intrusion Tolerance Model
4
作者 HUANG Jianhua LI Fanchao CHEN Liangjie 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期185-194,共10页
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to ... Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods. 展开更多
关键词 intrusion tolerance quantitative analysis semi-Markov model cost
原文传递
Non-intrusive data-driven ROM framework for hemodynamics problems
5
作者 M.Girfoglio L.Scandurra +7 位作者 F.Ballarin G.Infantino F.Nicolo A.Montalto G.Rozza R.Scrofani M.Comisso F.Musumeci 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2021年第7期1183-1191,I0003,共10页
Reduced order modeling(ROM)techniques are numerical methods that approximate the solution of parametric partial differential equation(PED)by properly combining the high-fidelity solutions of the problem obtained for s... Reduced order modeling(ROM)techniques are numerical methods that approximate the solution of parametric partial differential equation(PED)by properly combining the high-fidelity solutions of the problem obtained for several configurations,i.e.for several properly chosen values of the physical/geometrical parameters characterizing the problem.By starting from a database of high-fidelity solutions related to a certain values of the parameters,we apply the proper orthogonal decomposition with interpolation(PODI)and then reconstruct the variables of interest for new values of the parameters,i.e.different values from the ones included in the database.Furthermore,we present a preliminary web application through which one can run the ROM with a very user-friendly approach,without the need of having expertise in the numerical analysis and scientific computing field.The case study we have chosen to test the efficiency of our algorithm is represented by the aortic blood flow pattern in presence of a left ventricular(LVAD)assist device when varying the pump flow rate. 展开更多
关键词 Non intrusive model reduction Data-driven techniques HEMODYNAMICS LVAD Web computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部