Showing 21 - 40 results of 97 for search 'Secure Network Programming', query time: 0.09s Refine Results
  1. 21

    Link Failure Recovery Based on SDN by Le Hou, Shuo Wang, Yikai Lin, Botao Yao, Jiang Liu

    Published 2015-06-01
    “…As part of network securitynetwork disaster backup and recovery has been a focus,and traditional network lacks of automation failure detection and recovery too1. …”
    Get full text
    Article
  2. 22

    Real time database system data security collection scheme by Zhenyang SHANG, Ruixian YANG

    Published 2016-10-01
    “…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
    Get full text
    Article
  3. 23
  4. 24

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
    Get full text
    Article
  5. 25
  6. 26

    A Timer and Mixed Integer Linear Programming Load Shedding Scheme for Resilient DC Microgrids by Abdulrahman Babagana, Isah A. Jimoh, Yljon Seferi, Graeme Burt

    Published 2025-01-01
    “…Simulation results on a DC microgrid model adapted from the IEEE 37-bus network demonstrate the effectiveness of the proposed scheme. …”
    Get full text
    Article
  7. 27

    Optimal Topology Management for Software-Defined Networks Minimizing Latency and Using Network Slicing by Andrés Viveros, Pablo Adasme, Ali Dehghan Firoozabadi

    Published 2024-01-01
    “…We also minimize the connection latency between users and their network access nodes. Thus, the main highlights of the paper are to formally represent the problem utilizing two equivalent mixed-integer quadratic programming models. …”
    Get full text
    Article
  8. 28

    A health security-based framework for prioritizing regions for digital learning in complex health emergencies by Shawn M. D’Andrea, Nada Fadul, Bruce Struminger

    Published 2025-01-01
    “…Evaluation of recent virtual programs applied in acute health emergencies suggest that a pre-established digital learning network can serve as a valuable resource when an acute health emergency strikes. …”
    Get full text
    Article
  9. 29

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  10. 30
  11. 31
  12. 32

    Optimal Connection of Offshore Wind Farm with Maximization of Wind Capacity to Power Systems considering Losses and Security Constraints by Leandro A. Vasconcelos, João A. Passos Filho, Leonardo W. de Oliveira, Othon F. Avila

    Published 2019-01-01
    “…The algorithm is modeled using a Mixed Integer Nonlinear Programming (MINLP), and it is evaluated in a tutorial system and three well-known other networks from literature: IEEE 14-Bus, IEEE RTS-79, and Southern Brazilian System.…”
    Get full text
    Article
  13. 33

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…The article discusses the use of Ethereum blockchain technology in the Internet of Things (IoT) network for IT diagnostics of patients, which increases data security and user privacy. …”
    Get full text
    Article
  14. 34

    Network slicing deployment method based on isolation level by Qirun PAN, Kaizhi HUANG, Wei YOU

    Published 2020-04-01
    “…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
    Get full text
    Article
  15. 35

    QGA-based network service extension algorithm in NFV by Hang QIU, Hongbo TANG, Wei YOU, Yu ZHAO, Yi BAI

    Published 2022-11-01
    “…To meet the client’s new business requirements or add additional security protection functions, the already hosted network service extension problem in the cloud network based on network function virtualization was researched.The network service extension in the cloud network was modeled as an integer linear programming, considering the impact on initial service, extended graph deployment, resource capacity and virtual network function affinity constraints, and so on.To deal with the computational complexity and dynamism of future large-scale cloud networks, a QGA-based network service extension algorithm was proposed to improve solution efficiency and solution quality through quantum parallel computing.Simulation results prove that the efficient performance of the proposed algorithm in terms of extension successful ratio and average resource costs, and the proposed algorithm has low time complexity.…”
    Get full text
    Article
  16. 36

    Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-10-01
    “…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
    Get full text
    Article
  17. 37

    Detection of network intelligence features with the decision tree model by N. P. Sharaev, S. N. Petrov

    Published 2022-03-01
    “…O b j e c t i v e s .  Early detection of network intelligence allows to reduce the risks of information security of organizations. …”
    Get full text
    Article
  18. 38

    Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-06-01
    “…Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.…”
    Get full text
    Article
  19. 39

    Deep Q-Networks for Minimizing Total Tardiness on a Single Machine by Kuan Wei Huang, Bertrand M. T. Lin

    Published 2024-12-01
    “…The advent of Deep Q-Networks (DQNs) within the reinforcement learning paradigm could be a viable approach to transcending these limitations, offering a robust and adaptive approach. …”
    Get full text
    Article
  20. 40

    Improving resilience of networked multi-energy carrier microgrids through proactive scheduling by Ali Akbar Ghasemi, Mohsen Gitizadeh, Mohammadali Norouzi

    Published 2025-04-01
    “…This paper introduces a proactive scheduling model designed to bolster NMECM resilience during sudden outages in upstream gas and electricity networks. The proposed method adjusts microgrid scheduling to secure feasible islanding, maximize preparedness, and minimize operating costs and load shedding. …”
    Get full text
    Article