Resource Type

Journal Article 567

Year

2024 1

2023 60

2022 61

2021 55

2020 54

2019 37

2018 35

2017 39

2016 24

2015 22

2014 12

2013 16

2012 12

2011 5

2010 7

2009 7

2008 16

2007 19

2006 11

2005 16

open ︾

Keywords

neural network 32

artificial neural network 21

Neural network 11

network 10

optimization 9

Artificial intelligence 7

Software-defined networking (SDN) 7

convolutional neural network 7

genetic algorithm 7

artificial neural network (ANN) 6

industrial software 6

Deep learning 5

BP neural network 4

6G 3

ANN 3

Artificial neural network 3

Bayesian belief network 3

Network security 3

finite element method 3

open ︾

Search scope:

排序: Display mode:

Automatic discovery of stateful variables in network protocol software based on replay analysis Research Article

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3,   Pages 403-416 doi: 10.1631/FITEE.2200275

Abstract: and store some information about the sessions are prone to potential flaws caused by violations of protocolDiscovering such variables is significant in discovering and exploiting vulnerabilities in protocol softwareThe core idea is that a stateful variable features information of the communication entities and the softwareBased on recording and replaying a protocol program's execution, varieties of variables in the life cyclediscover automatically and then perform it on nine programs in ProFuzzBench and two complex real-world software

Keywords: Stateful variables     Network protocol software     Program analysis technology     Network security    

A multipath routing algorithm for satellite networksbased on service demand and traffic awareness Research Article

Ziyang XING, Hui QI, Xiaoqiang DI, Jinyao LIU, Rui XU, Jing CHEN, Ligang CONG,dixiaoqiang@cust.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 844-858 doi: 10.1631/FITEE.2200507

Abstract: traffic, which may lead to network congestion and affect data transmission.In addition, in traditional transmission, the convergence of network information acquisition is slowand global network information cannot be collected in a fine-grained manner, which is not conduciveBased on the above, in this paper artificial intelligence technology is applied to the , and a software-definednetwork is used to obtain the global network information, perceive network traffic, develop comprehensive

Keywords: Software-defined network (SDN)     Quick user datagram protocol Internet connection (QUIC)     Reinforcementlearning     Sketch     Multi-service demand     Satellite network    

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 78-82

Abstract:

Since the LEAP wireless authentication protocol is vulnerable to dictionary attacks, the flexibleThis friendly and easily deployable network access solution will be widely used in WLAN.The authors research and design this protocol in public wireless local area network, and implement the

Keywords: public wireless local area network     port based network access control (802.1x)     flexible authentication    

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014

Abstract:

The concept and technologies of computing-network integration are stillResearch on computing task scheduling and network interconnection are still inadequate.and summarizes the developmental trends of computing-network integration.The development path of ICCNT is explored, covering key technologies such as diversified protocol, vertical industry network, and data center network scenarios.

Keywords: intelligent connection computing network technology     diversified protocol     integration of network     storage    

A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc Article

Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu

Engineering 2022, Volume 19, Issue 12,   Pages 217-227 doi: 10.1016/j.eng.2021.10.022

Abstract:

As a special type of mobile ad hoc network (MANET), the flying ad hoc network (FANETThe routing protocol plays a pivotal role in FANET.However, when designing the routing protocol for FANET, it is conventionally assumed that the aerialIn this paper, a novel cyber-physical routing protocol exploiting the particular mobility pattern oflower overhead and lower average end-to-end latency, while maintaining a reasonably moderate and stable network

Keywords: Cyber-physical system     Flying ad hoc network (FANET)     Routing protocol     Trajectory dynamics     Unmanned    

Special issue on future network: software-defined networking Editorial

Tao HUANG,F. Richard YU,Yun-jie LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 7,   Pages 603-605 doi: 10.1631/FITEE.SDN2016

Abstract:

Keywords:    

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties None

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 238-252 doi: 10.1631/FITEE.1800516

Abstract: First, we build a zero-trust network environment through network isolation, and then multiple networkSecond, we propose a software-defined proactive cyber defense solution (SPD) for enterprise networkspath, while limiting the performance impact on the benign network user.Third, we implement our SPD proof-of-concept system over a software-defined network controller (OpenDaylightscan information, block network eavesdropping, and sharply increase the cost of cyber-attacks.

Keywords: Intranet defense     Software-defined network     Multi-dimensional maneuvering    

Research and Implementation of IP - VPN

Li Xiuzhong

Strategic Study of CAE 2002, Volume 4, Issue 3,   Pages 84-91

Abstract: In this paper, one way of network-based VPN QoS is proposed based on analysis of some available QoS algorithms

Keywords: virtual private routed network (VPRN)     virtual private LAN segment (VPLS)     border gateway protocol / multi-protocol    

Development of pretreatment protocol for DNA extraction from biofilm attached to biologic activated carbon

Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU

Frontiers of Environmental Science & Engineering 2010, Volume 4, Issue 4,   Pages 459-465 doi: 10.1007/s11783-010-0249-3

Abstract: This protocol was further tested using the vertical BAC samples from the full-scale biofilter of PinghuAll results suggested that the final protocol could produce qualified genomic DNA as a template from

Keywords: bacterial DNA extraction     biological activated carbon (BAC)     biofilm     water treatment     pretreatment protocol    

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015

Abstract:

With the development of the Internet, the process of computer software globalization continues toFor widely used software, anidentical binary code is installed on millions of computers; sometimes evenTraditional software security methods can only counter the threat temporarily, and cannot eliminate essentialThis paper proposes a scheme of combining software diversity with mimic defense in the software security

Keywords: software diversity     mimic defense     software security product    

Research and Realization of IP Multicast Routing Protocol

Li Wei

Strategic Study of CAE 2002, Volume 4, Issue 1,   Pages 82-88

Abstract:

This paper first explains why IP multicasting must be used. Then it summaries the fundamentals of IP multicasting and multicast routing protocols. After that it specially discusses protoool independent multicast-sparse mode (PIM-SM), points out its defect and proposes a scheme to solve it. In this scheme each source registers and sends data packets toward multiple rendezvous points (RPs) but receivers only join to a single RP. If one of the RPs fails, receivers will join to one of the alternative RPs quickly. On implementation, the paper centers on the details of implementing PIM-SM. Finally it discusses the problems and prospect of IP multicasting.

Keywords: protocol independent multicast-sparse mode (PIM-SM)     multiple rendezvous     point (RPs)     multicast    

Research on Multi-level Software Rejuvenationof Computing System

You Jing,Xu Jian,Li Qianmu, Liu Fengyu

Strategic Study of CAE 2007, Volume 9, Issue 2,   Pages 36-37

Abstract:

Recently,the phenomenon of software aging,one in which error conditionscalled software rejuvenation is proposed and the rejuvenation cost is analyzed.In order to reduce therejuvenation cost and improve software availability and reliability further, rejuvenation granularityBased on the law and the software architecture,the two software rejuvenation policies, i.e. time-basedmultilevel software rejuvenation policy and detection-based multilevel software rejuvenation policy,

Keywords: source filter     neural network     hysteresis comparator    

Hardware Module of Multi-Protocol Tester Based on the Specification of 2.0 Mb/s High Speed Signalling

Liu Zhihui

Strategic Study of CAE 2002, Volume 4, Issue 2,   Pages 79-85

Abstract: Protocol and signalling are becoming more and more important.Following the development of mobile communication and intelligence network, the 64 kb/s No.7 signallingSince there is no related protocol testing equipment used for telecommunication branch, The 2.048 Mb/s high speed signalling protocol-analyzing set is developed for this purpose.

Keywords: 2.048 Mb/s high speed signalling link     embedded processor     real time operating system     protocol-analyzing    

Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Research Articles

Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3,   Pages 351-360 doi: 10.1631/FITEE.2000709

Abstract: Inferring by reverse engineering is important for many network security applications, e.g., programeffective in handling binary-based ICS protocols based on network traffic analysis nor accurate in extractingprotocol fields from protocol implementations.framework (ICSPRF) that aims to extract ICS protocol fields with high accuracy.We evaluate our approach with six open-source ICS protocol implementations.

Keywords: Industrial control system (ICS)     ICS protocol reverse engineering     Dynamic taint analysis     Protocol format    

Modeling considerations in seismic assessment of RC bridges using state-of-practice structural analysis software

Ricardo MONTEIRO, Miguel ARAÚJO, Raimundo DELGADO, Mário MARQUES

Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 1,   Pages 109-124 doi: 10.1007/s11709-017-0389-7

Abstract: The many available software tools should therefore be evaluated and well understood, in order to be easilyneed by providing further insight with respect to the use of commonly employed structural analysis software

Keywords: nonlinear analysis     pushover     RC bridges     structural modelling software    

Title Author Date Type Operation

Automatic discovery of stateful variables in network protocol software based on replay analysis

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Journal Article

A multipath routing algorithm for satellite networksbased on service demand and traffic awareness

Ziyang XING, Hui QI, Xiaoqiang DI, Jinyao LIU, Rui XU, Jing CHEN, Ligang CONG,dixiaoqiang@cust.edu.cn

Journal Article

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Journal Article

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Journal Article

A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc

Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu

Journal Article

Special issue on future network: software-defined networking

Tao HUANG,F. Richard YU,Yun-jie LIU

Journal Article

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Journal Article

Research and Implementation of IP - VPN

Li Xiuzhong

Journal Article

Development of pretreatment protocol for DNA extraction from biofilm attached to biologic activated carbon

Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU

Journal Article

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Journal Article

Research and Realization of IP Multicast Routing Protocol

Li Wei

Journal Article

Research on Multi-level Software Rejuvenationof Computing System

You Jing,Xu Jian,Li Qianmu, Liu Fengyu

Journal Article

Hardware Module of Multi-Protocol Tester Based on the Specification of 2.0 Mb/s High Speed Signalling

Liu Zhihui

Journal Article

Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis

Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com

Journal Article

Modeling considerations in seismic assessment of RC bridges using state-of-practice structural analysis software

Ricardo MONTEIRO, Miguel ARAÚJO, Raimundo DELGADO, Mário MARQUES

Journal Article