Survivable strategy set design for malicious attack propagation in NEMO scenario

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survivable strategy set design for malicious attack propagation in NEMO scenario

Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure perspective. However, there have been few survivability strategy analyses in network mobility (NEMO) scenarios. To properly address this issue, this paper proposes two novel survivability strategi...

متن کامل

A Fast Strategy to Find Solution for Survivable Multicommodity ‎Network‎

This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...

متن کامل

Boosting Set Constraint Propagation for Network Design

This paper reconsiders the deployment of synchronous optical networks (SONET), an optimization problem naturally expressed in terms of set variables. Earlier approaches, using either MIP or CP technologies, focused on symmetry breaking, including the use of SBDS, and the design of effective branching strategies. This paper advocates an orthogonal approach and argues that the thrashing behavior ...

متن کامل

On Survivable Set Connectivity

In the Set Connectivity problem, we are given an n-node edge-weighted undirected graph and a collection of h set pairs (Si, Ti), where Si and Ti are subsets of nodes. The goal is to compute a min-cost subgraph H so that, for each set pair (Si, Ti), there exists at least one path in H between some node in Si and some node in Ti. In this paper, we initiate the study of the Survivable Set Connecti...

متن کامل

Digital Image Watermarking for Malicious Attack

In this paper, a copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed. In the proposed method, the original image is lossless and the watermark is robust to malicious attacks. The watermark logo is fused with noise bits to improve the security, and later XORed with the feature value of the image by 1/T rate FEC. During extraction, the watermark ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking

سال: 2016

ISSN: 1687-1499

DOI: 10.1186/s13638-016-0719-9