虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

SECURITY

网络安全技术及其协议,包括了网络通信安全、信息在网络传输中的保密性和完整性、控制访问受限网域与敏感信息以及在公共网络如因特网上使用隐秘通讯。为了解决这些问题,各大组织及技术供应商纷纷推出了各种网络和信息安全技术。
  • The Universal Radio Hacker (URH)

    The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include * __hardware interfaces__ for common Software Defined Radios * __easy demodulation__ of signals * __assigning participants__ to keep overview of your data * __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening * __assign labels__ to reveal the logic of the protocol * __fuzzing component__ to find SECURITY leaks * __modulation support__ to inject the data back into the system * __simulation environment__ to perform stateful attacks

    标签: Universal Hacker Radio The URH

    上传时间: 2018-11-23

    上传用户:milo

  • Cyber-Physical Systems

    This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, SECURITY, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, SECURITY and privacy

    标签: Cyber-Physical Systems

    上传时间: 2019-04-21

    上传用户:danyun

  • GSM 03.48

    Digital cellular telecommunications system (Phase 2+); SECURITY mechanisms for SIM application toolkit; Stage 2 (3GPP TS 03.48 version 8.8.0 Release 1999)

    标签: GSM

    上传时间: 2019-06-14

    上传用户:twogozi

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the SECURITY level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Active+and+Programmable+Networks

    New applications such as video conferencing, video on demand, multi- media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet SECURITY require advanced functionality from networks beyond simple forwarding congestion control techniques. 

    标签: Programmable Networks Active and

    上传时间: 2020-05-26

    上传用户:shancjb

  • Short-range+Wireless+Communication

    Developers, manufacturers and marketers of products incorporating short- range radio systems are experts in their fields—SECURITY, telemetry, medical care, to name a few. Often they add a wireless interface just to eliminate wires on an existing wired product. They may adapt a wireless subsystem, which is easy to integrate electrically into their system, only to find that the range is far short of what they expected, there are frequent false alarms, or it doesn’t work at all. It is for these adapters of wireless subsystems that this book is primarily intended.

    标签: Communication Short-range Wireless

    上传时间: 2020-06-01

    上传用户:shancjb

  • Telecommunications Essentials Global Source

    In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascinating industry. Besides including a satisfying amount of expert technical detail, the book also discusses equally crucial aspects of how communications technology affects society, culture, and politics. Electronic communications is changing the world for the better; learn from Lili's expertise how you, too, can participate in the revolution." Steve Riley, senior SECURITY strategist, Microsoft Corporation

    标签: Telecommunications Essentials Global Source

    上传时间: 2020-06-01

    上传用户:shancjb

  • Service+Robotics+within+the+Digital+Home

    Over the past few decades there has been an exponential growth in service robots and smart home technologies, which has led to the development of exciting new products in our daily lives. Service robots can be used to provide domestic aid for the elderly and disabled, serving various functions ranging from cleaning to enter- tainment. Service robots are divided by functions, such as personal robots, field robots, SECURITY robots, healthcare robots, medical robots, rehabilitation robots and entertainment robots. A smart home appears “intelligent” because its embedded computers can monitor so many aspects of the daily lives of householders. For example, the refrigerator may be able to monitor its contents, suggest healthy alter- natives and order groceries. Also, the smart home system may be able to clean the house and water the plants.

    标签: Robotics Service Digital within Home the

    上传时间: 2020-06-06

    上传用户:shancjb

  • Big+Data+Analytics+Strategies

    This is a practical book, to be sure, but it is also a book about hope and posi- tive change. I am quite sincere. The delivery of electricity is deeply rooted in the principle of universal access; when clean, reliable energy is available it contributes to poverty alleviation, improved social conditions, and enhanced economic development. In the developed world, we know this to be true. The digital fabric of our lives is a testimony to the importance of energy SECURITY. Across the globe, we have seen the vital contributions that electrification has brought to the development of economies and an enhanced quality of life. Nonetheless, this supreme engineering achievement has languished, and we are deeply challenged.

    标签: Strategies Analytics Data Big

    上传时间: 2020-06-07

    上传用户:shancjb

  • Computational+Intelligence

    The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in supporting the evolution of conventional electrical grids toward active, flexible and self- healing web energy networks composed of distributed and cooperative energy resources. From a conceptual point of view, the SG is the convergence of information and operational technologies applied to the electric grid, providing sustainable options to customers and improved SECURITY. Advances in research on SGs could increase the efficiency of modern electrical power systems by: (i) supporting the massive penetration of small-scale distributed and dispersed generators; (ii) facilitating the integration of pervasive synchronized metering systems; (iii) improving the interaction and cooperation between the network components; and (iv) allowing the wider deployment of self-healing and proactive control/protection paradigms.

    标签: Computational Intelligence

    上传时间: 2020-06-07

    上传用户:shancjb