Browse Conferences
Analysis of APT Attack Source Tracing in Industrial Internet Environment
With the development of industrial control systems (ICS), advanced persistent threat (APT) attacks have become one of the important security threats faced by ICS. In recent years, APT attacks against industrial control systems are common. A...
Deployment Schemes of In-Band Management Mode Based on Industrial SDN Network
When software defined network (SDN) is used to deploy the industrial control network, the deployment schemes are different in actual according to the different industrial production business, environment and capital cost. In this paper, we ...
An Iteratively closed-form solution to passive localization by a single moving observer using TOA only with unknown SRI
An iteratively closed-form solution to passive localization by a single moving observer only using time of arrival (TOA) only with unknown signal repetition interval (SRI) is investigated in this paper. The proposed algorithm includes three...
Multi-sensor Iterative Decision Feedback Equalization Based on Joint Channel Parameters Estimation
For the joint equalization problem of multi-sensor signals over frequency selective fading channels, a new iterative decision feedback equalization scheme is proposed based on joint channel parameters estimation. Firstly, the multi-sensor j...
Performance Analysis of Voting Rule in the Presence of SSDF Attack in Interweave Cognitive Radio Networks
Cognitive radio (CR) is widely recognized as a viable solution for spectrum underutilization. Cooperative spectrum sensing (CSS) is a core aspect of CR that improves spectrum sensing performance through spatial diversity. Howeverr, CR provi...
Certificateless Aggregate Signature Authentication Scheme based on Blockchain in Smart Home Network
The low delay of edge computing can endue home network with all kinds of intelligence and services. However, the existing centralized security authentication mechanism for smart home network still has some problems such as confidentiality a...
Study on the Performance Impact and Implementation of Hardware Prefetch Technology in memory Subsystems
“Memory wall” has always been an important bottleneck restricting the further improvement of the processor performance. In order to resolve this limitation, the hardware pre-fetch technology is introduced into the processor as an importan...
Reliable Synchronization Technology for Continuous Variable Quantum Key Distribution System
Data synchronization is a critical technique for subsequent signal processing and secret key extraction of continuous variable quantum key distribution (CVQKD). In this paper, we propose a four-segment synchronization frame structure for CV...
Dynamic Deployment Model of Lightweight Honeynet for Internet of Things
Distributed honeynet is an important active defense system in the application scenario of Internet of Things. It is a long-term challenge to enhance the deception of honeynet to intruders. In order to increase the deception of distributed h...
Modified Hybrid Inverse Continuous Modes With a Phase-Shifted Parameter for Designing Broadband Power Amplifier
A modified hybrid inverse continuous modes (HICM) is proposed in this paper for designing broadband power amplifiers (BPAs). The proposed continuous working mode expands the design space of the inverse continuums through adding a phase-shif...