The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Obecność na rynku coraz to większej liczby producentów zabezpieczeń wymaga tworzenia innowacyjnych rozwiązań technologicznych. Przykładem mogą być zabezpieczenia odległościowe wykorzystujące kryterium podimpedancyjne do ochrony obiektów, tj. linie czy transformatory przed skutkami zwarć. Zależnie od producenta proponowane są różnego rodzaju kształty charakterystyk impedancyjnych pomiarowych/rozruchowych,...
The 21st century is an age of information; e-government has become an inevitable trend for social information development. However, most e-government system currently just gives emphasis to construction but not security. Security evaluation to e-government system is a necessary means to master security of e-government system. The paper makes researches and analysis to many aspects of e-government...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
Software vulnerability is the major root of security issues which results in serious attacks such as DDOS and worms. How to find vulnerability especially on binaries has been an alluring but challenging topic. Traditional black-box fuzzing heavily relies on input format so that it cannot work on unknown formats, more severely, it cannot generate effective test cases because it randomly change input...
When large data repositories are coupled with geographic distribution of data, users and systems, it is necessary to combine different technologies for implementing high-performance distributed knowledge discovery systems. On the other hand, computational grid is emerging as a very promising infrastructure for high-performance distributed computing. Grid applications such as astronomy, chemistry,...
During the last years, need for increased funding for national health services offered to citizens is rising. The reasons are (i) decreased ratio of working population/pensioners, as well as (ii) increase of life expectancy. Thus, high priority should be given to safeguarding the reliable administration of the financial resources devoted to this purpose. This paper describes the application of a "clever"...
Aimed at the intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the advantages of wavelet neural network (WNN), an intrusion detection method based on WNN is presented in this paper. Moreover, we adopt a algorithm of reduce the number of the wavelet basic function by analysis the sparseness property of sample data which can optimize the wavelet network...
Buffer overflow vulnerabilities can cause attacks that result in serious consequences. However the techniques of buffer overflow vulnerability detection are limited to manual analysis, binary-patch comparison, fuzzing and so on. They rely on manual analysis, thus cause high overhead. In this paper, we propose a novel method of detection of buffer overflow vulnerabilities, which is based on fuzzing,...
Przedstawiono problem zagrożeń naruszenia bezpiecznej pracy układów i systemów przez ataki techniczne. Pokazano ryzyko ataków opartych na różnych technikach przechwytywania informacji, przez kanały diagnostyczne oraz symulację błędów. Przedstawiono metody uodporniania się na te ataki. Artykuł może zainteresować projektantów i użytkowników systemów wymagających wysokiego poziomu bezpieczeństwa.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.