Search scope:
排序: Display mode:
Automatic discovery of stateful variables in network protocol software based on replay analysis Research Article
Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3, Pages 403-416 doi: 10.1631/FITEE.2200275
Keywords: Stateful variables Network protocol software Program analysis technology Network security
A multipath routing algorithm for satellite networksbased on service demand and traffic awareness Research Article
Ziyang XING, Hui QI, Xiaoqiang DI, Jinyao LIU, Rui XU, Jing CHEN, Ligang CONG,dixiaoqiang@cust.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6, Pages 844-858 doi: 10.1631/FITEE.2200507
Keywords: Software-defined network (SDN) Quick user datagram protocol Internet connection (QUIC) Reinforcementlearning Sketch Multi-service demand Satellite network
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 78-82
Since the LEAP wireless authentication protocol is vulnerable to dictionary attacks, the flexibleThis friendly and easily deployable network access solution will be widely used in WLAN.The authors research and design this protocol in public wireless local area network, and implement the
Keywords: public wireless local area network port based network access control (802.1x) flexible authentication
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014
The concept and technologies of computing-network integration are stillResearch on computing task scheduling and network interconnection are still inadequate.and summarizes the developmental trends of computing-network integration.The development path of ICCNT is explored, covering key technologies such as diversified protocol, vertical industry network, and data center network scenarios.
Keywords: intelligent connection computing network technology diversified protocol integration of network storage
A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc Article
Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu
Engineering 2022, Volume 19, Issue 12, Pages 217-227 doi: 10.1016/j.eng.2021.10.022
As a special type of mobile ad hoc network (MANET), the flying ad hoc network (FANETThe routing protocol plays a pivotal role in FANET.However, when designing the routing protocol for FANET, it is conventionally assumed that the aerialIn this paper, a novel cyber-physical routing protocol exploiting the particular mobility pattern oflower overhead and lower average end-to-end latency, while maintaining a reasonably moderate and stable network
Keywords: Cyber-physical system Flying ad hoc network (FANET) Routing protocol Trajectory dynamics Unmanned
Special issue on future network: software-defined networking Editorial
Tao HUANG,F. Richard YU,Yun-jie LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 7, Pages 603-605 doi: 10.1631/FITEE.SDN2016
Keywords: 无
Yang CHEN, Hong-chao HU, Guo-zhen CHENG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 238-252 doi: 10.1631/FITEE.1800516
Keywords: Intranet defense Software-defined network Multi-dimensional maneuvering
Research and Implementation of IP - VPN
Li Xiuzhong
Strategic Study of CAE 2002, Volume 4, Issue 3, Pages 84-91
Keywords: virtual private routed network (VPRN) virtual private LAN segment (VPLS) border gateway protocol / multi-protocol
Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU
Frontiers of Environmental Science & Engineering 2010, Volume 4, Issue 4, Pages 459-465 doi: 10.1007/s11783-010-0249-3
Keywords: bacterial DNA extraction biological activated carbon (BAC) biofilm water treatment pretreatment protocol
Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry
Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015
With the development of the Internet, the process of computer software globalization continues toFor widely used software, anidentical binary code is installed on millions of computers; sometimes evenTraditional software security methods can only counter the threat temporarily, and cannot eliminate essentialThis paper proposes a scheme of combining software diversity with mimic defense in the software security
Keywords: software diversity mimic defense software security product
Research and Realization of IP Multicast Routing Protocol
Li Wei
Strategic Study of CAE 2002, Volume 4, Issue 1, Pages 82-88
This paper first explains why IP multicasting must be used. Then it summaries the fundamentals of IP multicasting and multicast routing protocols. After that it specially discusses protoool independent multicast-sparse mode (PIM-SM), points out its defect and proposes a scheme to solve it. In this scheme each source registers and sends data packets toward multiple rendezvous points (RPs) but receivers only join to a single RP. If one of the RPs fails, receivers will join to one of the alternative RPs quickly. On implementation, the paper centers on the details of implementing PIM-SM. Finally it discusses the problems and prospect of IP multicasting.
Keywords: protocol independent multicast-sparse mode (PIM-SM) multiple rendezvous point (RPs) multicast
Research on Multi-level Software Rejuvenationof Computing System
You Jing,Xu Jian,Li Qianmu, Liu Fengyu
Strategic Study of CAE 2007, Volume 9, Issue 2, Pages 36-37
Recently,the phenomenon of software aging,one in which error conditionscalled software rejuvenation is proposed and the rejuvenation cost is analyzed.In order to reduce therejuvenation cost and improve software availability and reliability further, rejuvenation granularityBased on the law and the software architecture,the two software rejuvenation policies, i.e. time-basedmultilevel software rejuvenation policy and detection-based multilevel software rejuvenation policy,
Keywords: source filter neural network hysteresis comparator
Liu Zhihui
Strategic Study of CAE 2002, Volume 4, Issue 2, Pages 79-85
Keywords: 2.048 Mb/s high speed signalling link embedded processor real time operating system protocol-analyzing
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Research Articles
Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3, Pages 351-360 doi: 10.1631/FITEE.2000709
Keywords: Industrial control system (ICS) ICS protocol reverse engineering Dynamic taint analysis Protocol format
Ricardo MONTEIRO, Miguel ARAÚJO, Raimundo DELGADO, Mário MARQUES
Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 1, Pages 109-124 doi: 10.1007/s11709-017-0389-7
Keywords: nonlinear analysis pushover RC bridges structural modelling software
Title Author Date Type Operation
Automatic discovery of stateful variables in network protocol software based on replay analysis
Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU
Journal Article
A multipath routing algorithm for satellite networksbased on service demand and traffic awareness
Ziyang XING, Hui QI, Xiaoqiang DI, Jinyao LIU, Rui XU, Jing CHEN, Ligang CONG,dixiaoqiang@cust.edu.cn
Journal Article
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Journal Article
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Journal Article
A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc
Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu
Journal Article
Special issue on future network: software-defined networking
Tao HUANG,F. Richard YU,Yun-jie LIU
Journal Article
Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties
Yang CHEN, Hong-chao HU, Guo-zhen CHENG
Journal Article
Development of pretreatment protocol for DNA extraction from biofilm attached to biologic activated carbon
Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU
Journal Article
Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry
Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing
Journal Article
Research on Multi-level Software Rejuvenationof Computing System
You Jing,Xu Jian,Li Qianmu, Liu Fengyu
Journal Article
Hardware Module of Multi-Protocol Tester Based on the Specification of 2.0 Mb/s High Speed Signalling
Liu Zhihui
Journal Article
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com
Journal Article