Real-Time Digital Signatures for Time-Critical Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Real-time Anomaly Detection for Safeguarding Critical Networks

Critical networks require defence in depth incorporating many different security technologies including intrusion detection. One important intrusion detection approach is called anomaly detection where normal (good) behaviour of users of the protected system is modelled, often using machine learning or data mining techniques. During detection new data is matched against the normality model, and...

متن کامل

Fuzzy completion time for alternative stochastic networks

In this paper a network comprising alternative branching nodes with probabilistic outcomes is considered. In other words, network nodes are probabilistic with exclusive-or receiver and exclusive-or emitter. First, an analytical approach is proposed to simplify the structure of network. Then, it is assumed that the duration of activities is positive trapezoidal fuzzy number (TFN). This paper com...

متن کامل

Digital Filter Analysis : Real - time and Non Real - time Performance

The Spatial Transformation of Sound Fields (STSF) technique involves a scan using an array of transducers over a (planar) surface close to the source under investigation. From cross spectra measured during the scan, a principal component representation of the sound field is extracted. Any power descriptor of the near field (intensity, sound pressure, etc.) can then be investigated by means of N...

متن کامل

A Real Time Routing Protocol for Detection of Time Critical Events in Wireless Sensor Networks

Many applications of Wireless Sensor Network (WSN) are designed for vital event monitoring and to ensure timeliness and reliability for the measured environmental values. The communication protocol needs to prioritize the real time data and ensure the timely delivery of the data to the sink node. In this paper, a routing protocol for WSN has been proposed with congestion and delay aware mode to...

متن کامل

Intrusion Detection in Real-Time Database Systems via Time Signatures

In this paper, we describe a method for intrusion detection applied to real-time database systems. The novel idea pursued in this study is to exploit the real-time properties of data in intrusion detection. Data objects will be tagged with “time semantics” that capture expectations about update rates that are unknown to the intruders. This is not simply timestamping data. Our notion of time sig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2017

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2017.2716911