首页 > 最新文献

International Conference on Computer Systems and Technologies最新文献

英文 中文
NFC-based pervasive learning service for children 基于nfc的儿童普适学习服务
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516804
R. Ivanov
In this paper we present the design, development and implementation of the pervasive learning system for children. The required hardware is a Near Field Communication (NFC)-enabled mobile phone with built-in accelerometer. Trainers (teachers or parents) describe the objects from the learning environment through their voice and associate this voice-based description to a specific object by using the radio frequency identification (RFID) tags. They are able to sync their audio recordings, to share and re-associate with their own RFID tags (clone) audio recordings of other trainers through Google App Engine cloud environment. Children can later use the service to scan surrounding augmented objects and verbalize their identity and characteristics. The service allows the development of a variety of learning scenarios, such as getting started with the colors, letters and numbers, shape recognition, recognition of objects from learning environment, learning foreign languages, and many others. Interaction between children and objects from learning environment should be simple and intuitive. To meet this goal for invisible computing, we simulate human-human interaction than use well known human-computer interaction models. We use a tangible user interface (TUI) based on following interaction techniques: touch, gesture recognition, natural voice-based output. Preliminary results show that the service can be used easily by young children, thanks to its tangible interface that is simple, easy to use, useful, accessible and invisible to technology.
本文介绍了儿童普适学习系统的设计、开发和实现。所需的硬件是支持近场通信(NFC)、内置加速度计的手机。培训师(教师或家长)通过声音描述学习环境中的对象,并通过使用射频识别(RFID)标签将这种基于声音的描述与特定对象关联起来。他们能够同步他们的录音,通过b谷歌App Engine云环境共享和重新关联他们自己的RFID标签(克隆)其他培训师的录音。孩子们以后可以使用这项服务扫描周围的增强物体,并说出它们的身份和特征。该服务允许开发各种学习场景,例如从颜色,字母和数字开始,形状识别,从学习环境中识别物体,学习外语等等。儿童与学习环境中的物体之间的互动应该是简单直观的。为了实现这个无形计算的目标,我们模拟了人机交互,而不是使用众所周知的人机交互模型。我们使用基于以下交互技术的有形用户界面(TUI):触摸,手势识别,基于自然语音的输出。初步结果表明,该服务可以很容易地被幼儿使用,因为它的有形界面简单,易于使用,有用,可访问和不受技术的影响。
{"title":"NFC-based pervasive learning service for children","authors":"R. Ivanov","doi":"10.1145/2516775.2516804","DOIUrl":"https://doi.org/10.1145/2516775.2516804","url":null,"abstract":"In this paper we present the design, development and implementation of the pervasive learning system for children. The required hardware is a Near Field Communication (NFC)-enabled mobile phone with built-in accelerometer. Trainers (teachers or parents) describe the objects from the learning environment through their voice and associate this voice-based description to a specific object by using the radio frequency identification (RFID) tags. They are able to sync their audio recordings, to share and re-associate with their own RFID tags (clone) audio recordings of other trainers through Google App Engine cloud environment. Children can later use the service to scan surrounding augmented objects and verbalize their identity and characteristics. The service allows the development of a variety of learning scenarios, such as getting started with the colors, letters and numbers, shape recognition, recognition of objects from learning environment, learning foreign languages, and many others. Interaction between children and objects from learning environment should be simple and intuitive. To meet this goal for invisible computing, we simulate human-human interaction than use well known human-computer interaction models. We use a tangible user interface (TUI) based on following interaction techniques: touch, gesture recognition, natural voice-based output. Preliminary results show that the service can be used easily by young children, thanks to its tangible interface that is simple, easy to use, useful, accessible and invisible to technology.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A computer modeling of the throughput of a crossbar switch by PI-patterns for uniform traffic with variable intensity 用pi模式对可变强度均匀通信量的交叉开关吞吐量进行计算机建模
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516790
T. Tashev, V. Monov
In this paper we propose a model of load traffic with variable intensity for a switch node. Our model is based on a family of periodic input patterns (PI-patterns) for uniform traffic. We have used the family of patterns in order to study the throughput of a crossbar switch node. Our simulation studies use the Generalized Nets (GN) model of the known PIM-algorithm. The simulation results of a GN-model using the family of PI-Patterns are presented and analyzed. It is shown that our family of patterns for variable traffic intensity enables us to estimate the maximal throughput of the switch in case of uniform traffic.
本文提出了一个交换节点的变强度负荷流量模型。我们的模型是基于一组周期输入模式(pi模式)的统一流量。为了研究交叉交换节点的吞吐量,我们使用了模式族。我们的仿真研究使用了已知的pim算法的广义网络(GN)模型。给出并分析了基于pi模式族的gn模型的仿真结果。结果表明,我们的可变流量强度模式族使我们能够估计均匀流量情况下交换机的最大吞吐量。
{"title":"A computer modeling of the throughput of a crossbar switch by PI-patterns for uniform traffic with variable intensity","authors":"T. Tashev, V. Monov","doi":"10.1145/2516775.2516790","DOIUrl":"https://doi.org/10.1145/2516775.2516790","url":null,"abstract":"In this paper we propose a model of load traffic with variable intensity for a switch node. Our model is based on a family of periodic input patterns (PI-patterns) for uniform traffic. We have used the family of patterns in order to study the throughput of a crossbar switch node. Our simulation studies use the Generalized Nets (GN) model of the known PIM-algorithm. The simulation results of a GN-model using the family of PI-Patterns are presented and analyzed. It is shown that our family of patterns for variable traffic intensity enables us to estimate the maximal throughput of the switch in case of uniform traffic.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A surveillance system of a military harbour using an automatic identification system 一种使用自动识别系统的军事港口监视系统
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516785
L. Rothkrantz, K. Scholte
The goal of our research is the design and implementation of a surveillance system based on an Automatic Identification System (AIS). The AIS system enables operators in a control room to monitor ship movements in and along the harbour. There is a need to support human operators. The automated system is modelled after human operator. The transitions between the four steps Observation-Orientation-Decision-Action (OODA-loop) are realised using a rule based expert system and Bayesian networks. The design, implementation and results of experiments are reported in the paper.
我们的研究目标是设计和实现一个基于自动识别系统(AIS)的监控系统。AIS系统使操作员能够在控制室监控港口内和沿岸的船舶运动。有必要支持人工操作员。这个自动化系统是模仿人工操作的。使用基于规则的专家系统和贝叶斯网络实现了观察-定向-决策-行动(OODA-loop)四个步骤之间的转换。本文介绍了该系统的设计、实现和实验结果。
{"title":"A surveillance system of a military harbour using an automatic identification system","authors":"L. Rothkrantz, K. Scholte","doi":"10.1145/2516775.2516785","DOIUrl":"https://doi.org/10.1145/2516775.2516785","url":null,"abstract":"The goal of our research is the design and implementation of a surveillance system based on an Automatic Identification System (AIS). The AIS system enables operators in a control room to monitor ship movements in and along the harbour. There is a need to support human operators. The automated system is modelled after human operator. The transitions between the four steps Observation-Orientation-Decision-Action (OODA-loop) are realised using a rule based expert system and Bayesian networks. The design, implementation and results of experiments are reported in the paper.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multifactor modelling system with cloud based pre-processing 基于云预处理的多因素建模系统
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516802
Ventsislav Nikolov, Danko Naydenov
In this paper a practical multifactor modelling system is described implementing heuristic searching of polynomial formula that describe an unpredictable time series by a set of predictable series. The data needed for the calculations are pre-processed by a cloud computing system to fill the missing values. The features and problems of both pre-processing and formula searching systems are presented and analyzed.
本文描述了一个实用的多因素建模系统,该系统实现了用一组可预测序列来描述不可预测时间序列的多项式公式的启发式搜索。计算所需的数据由云计算系统进行预处理,以填补缺失的值。介绍并分析了预处理系统和公式搜索系统的特点和存在的问题。
{"title":"Multifactor modelling system with cloud based pre-processing","authors":"Ventsislav Nikolov, Danko Naydenov","doi":"10.1145/2516775.2516802","DOIUrl":"https://doi.org/10.1145/2516775.2516802","url":null,"abstract":"In this paper a practical multifactor modelling system is described implementing heuristic searching of polynomial formula that describe an unpredictable time series by a set of predictable series. The data needed for the calculations are pre-processed by a cloud computing system to fill the missing values. The features and problems of both pre-processing and formula searching systems are presented and analyzed.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Watermarking Java application programs using the WaterRpg dynamic model Java水印应用程序,采用WaterRpg动态模型
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516819
Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos
We have recently presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F [π*], through the use of self-inverting permutations π* and proposed a dynamic watermarking model, which we named WaterRpg, for embedding the watermark graph F [π*] into an application program P. In this paper, we implement our watermarking model WaterRpg in real application programs, taken from a game database, and evaluate its functionality under various watermarking issues supported by our WaterRpg model. More precisely, we selected a number of Java application programs and watermark them using two main approaches. First, we show in detail a straightforward or naive approach for watermarking a given program P which is based only on the well-defined call patterns of our model, and then we prove structural and programming properties of the call patterns based on which we can watermark the program P in a more stealthy way. The experimental results show the efficient functionality of all the programs P* watermarked under the naive-case and all the stealthy-cases. The size and the time overhead of the propose watermarking are very low.
我们最近提出了一种有效的编解码系统,通过使用自反转排列π*,将水印数字w编码为可约置换图F [π*],并提出了一种动态水印模型,我们将其命名为WaterRpg,用于将水印图F [π*]嵌入到应用程序p中。并在我们的WaterRpg模型支持的各种水印问题下评估其功能。更准确地说,我们选择了一些Java应用程序,并使用两种主要方法对它们进行水印。首先,我们详细展示了一种简单或朴素的方法来对给定程序P进行水印,该方法仅基于我们模型中定义良好的调用模式,然后我们证明了调用模式的结构和编程特性,基于这些特性,我们可以以更隐蔽的方式对程序P进行水印。实验结果表明,所有P*水印程序在原始情况和所有隐身情况下都具有高效的功能。所提出的水印的大小和时间开销都很低。
{"title":"Watermarking Java application programs using the WaterRpg dynamic model","authors":"Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos","doi":"10.1145/2516775.2516819","DOIUrl":"https://doi.org/10.1145/2516775.2516819","url":null,"abstract":"We have recently presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F [π*], through the use of self-inverting permutations π* and proposed a dynamic watermarking model, which we named WaterRpg, for embedding the watermark graph F [π*] into an application program P. In this paper, we implement our watermarking model WaterRpg in real application programs, taken from a game database, and evaluate its functionality under various watermarking issues supported by our WaterRpg model. More precisely, we selected a number of Java application programs and watermark them using two main approaches. First, we show in detail a straightforward or naive approach for watermarking a given program P which is based only on the well-defined call patterns of our model, and then we prove structural and programming properties of the call patterns based on which we can watermark the program P in a more stealthy way. The experimental results show the efficient functionality of all the programs P* watermarked under the naive-case and all the stealthy-cases. The size and the time overhead of the propose watermarking are very low.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting adaptive e-Learning: an approach based on open-source learning management systems 支持自适应电子学习:一种基于开源学习管理系统的方法
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516815
Hristo Indzhov, Polina Zhelyazkova, G. Totkov
The paper presents a working prototype of an adaptive learning management system (LMS) and a generalized schema for achieving process awareness in an LMS (or other type of system). Further, it proposes a reference implementation to the generalized schema based on the open-source computer learning environment Moodle and achieves adaptability by utilizing the Workflow Management System Activiti.
本文提出了一个自适应学习管理系统(LMS)的工作原型,以及一个在LMS(或其他类型的系统)中实现过程感知的通用模式。在此基础上,提出了基于开源计算机学习环境Moodle的通用模式参考实现,并利用工作流管理系统Activiti实现了适应性。
{"title":"Supporting adaptive e-Learning: an approach based on open-source learning management systems","authors":"Hristo Indzhov, Polina Zhelyazkova, G. Totkov","doi":"10.1145/2516775.2516815","DOIUrl":"https://doi.org/10.1145/2516775.2516815","url":null,"abstract":"The paper presents a working prototype of an adaptive learning management system (LMS) and a generalized schema for achieving process awareness in an LMS (or other type of system). Further, it proposes a reference implementation to the generalized schema based on the open-source computer learning environment Moodle and achieves adaptability by utilizing the Workflow Management System Activiti.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128706462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QRS detection algorithm for long term Holter records 长期动态心电图记录的QRS检测算法
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516811
G. Georgieva-Tsaneva
In this paper an exact QRS detection algorithm of Holter electrocardiogram signals using Wavelet Transform is present. The orthogonal wavelet functions -- Haar and Daubechies -- is studied and compared. Analysis is carried out using Visual C++ Software. The results show that the described algorithm provides excellent QRS detection even if the signals are contaminated with noises. The presented algorithm is less computationally involved. This makes it ideal for wide range of diagnostic applications, especially for real-time Holter monitoring.
本文提出了一种基于小波变换的动态心电图信号精确QRS检测算法。对正交小波函数Haar和Daubechies进行了研究和比较。使用Visual c++软件进行分析。结果表明,即使信号被噪声污染,该算法也能提供良好的QRS检测效果。该算法的计算量较小。这使得它非常适合广泛的诊断应用,特别是实时动态心电图监测。
{"title":"QRS detection algorithm for long term Holter records","authors":"G. Georgieva-Tsaneva","doi":"10.1145/2516775.2516811","DOIUrl":"https://doi.org/10.1145/2516775.2516811","url":null,"abstract":"In this paper an exact QRS detection algorithm of Holter electrocardiogram signals using Wavelet Transform is present. The orthogonal wavelet functions -- Haar and Daubechies -- is studied and compared. Analysis is carried out using Visual C++ Software. The results show that the described algorithm provides excellent QRS detection even if the signals are contaminated with noises. The presented algorithm is less computationally involved. This makes it ideal for wide range of diagnostic applications, especially for real-time Holter monitoring.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identification of vulnerable parts of web applications based on anomaly detection in HTTP 基于HTTP异常检测的web应用脆弱部分识别
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516796
Rastislav Szabó, L. Hudec
This paper describes a concept of an algorithm, which can be used for automated identification of vulnerable parts of web applications based on increased occurrence of anomalies detected by the anomaly-based IDS (Intrusion Detection System). The output of our anomaly evaluation algorithm can direct security engineers and application developers to those modules of a web application, which are "attractive" for the attackers, or even point to some security vulnerabilities in particular modules of the application. The methods of anomaly detection in HTTP traffic and process of building the model of the application's structure by analysis of requested URLs are also discussed in this paper.
本文描述了一种算法的概念,该算法可以基于基于异常的入侵检测系统(IDS)检测到的越来越多的异常来自动识别web应用程序的脆弱部分。我们的异常评估算法的输出可以引导安全工程师和应用程序开发人员找到web应用程序中那些对攻击者“有吸引力”的模块,甚至可以指出应用程序中特定模块的一些安全漏洞。本文还讨论了HTTP流量异常检测的方法和通过分析请求的url建立应用程序结构模型的过程。
{"title":"Identification of vulnerable parts of web applications based on anomaly detection in HTTP","authors":"Rastislav Szabó, L. Hudec","doi":"10.1145/2516775.2516796","DOIUrl":"https://doi.org/10.1145/2516775.2516796","url":null,"abstract":"This paper describes a concept of an algorithm, which can be used for automated identification of vulnerable parts of web applications based on increased occurrence of anomalies detected by the anomaly-based IDS (Intrusion Detection System). The output of our anomaly evaluation algorithm can direct security engineers and application developers to those modules of a web application, which are \"attractive\" for the attackers, or even point to some security vulnerabilities in particular modules of the application. The methods of anomaly detection in HTTP traffic and process of building the model of the application's structure by analysis of requested URLs are also discussed in this paper.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Loading test of Apache HTTP server by video file and usage measurements of the hardware components 通过视频文件对Apache HTTP服务器进行加载测试,并对硬件组件的使用情况进行测量
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516799
Stanislav Dimitrov, T. Stoilov
Web sites, which enable watching video clips online, have become very popular nowadays. One of the main problems with regard to that is the highly increasing workload of the machines that support those sites. The text describes the structure of Apache HTTP Server and focuses on the parameters that influence the efficiency of its usage. It also carefully considers new opportunities for better service of Apache users' requests. With this respect, the potential of mod_deflate module have been explored. The results obtained from all the conducted experiments are analyzed and graphically presented.
现在,可以在线观看视频的网站变得非常流行。与此相关的一个主要问题是,支持这些站点的机器的工作量急剧增加。本文介绍了Apache HTTP Server的结构,重点介绍了影响其使用效率的参数。它还仔细考虑了更好地服务Apache用户请求的新机会。在这方面,探索了mod_deflate模块的潜力。对所进行的所有实验的结果进行了分析并以图形形式给出。
{"title":"Loading test of Apache HTTP server by video file and usage measurements of the hardware components","authors":"Stanislav Dimitrov, T. Stoilov","doi":"10.1145/2516775.2516799","DOIUrl":"https://doi.org/10.1145/2516775.2516799","url":null,"abstract":"Web sites, which enable watching video clips online, have become very popular nowadays. One of the main problems with regard to that is the highly increasing workload of the machines that support those sites. The text describes the structure of Apache HTTP Server and focuses on the parameters that influence the efficiency of its usage. It also carefully considers new opportunities for better service of Apache users' requests. With this respect, the potential of mod_deflate module have been explored. The results obtained from all the conducted experiments are analyzed and graphically presented.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing port security feature using SNMP protocol 通过SNMP协议实现端口安全特性
Pub Date : 2013-06-28 DOI: 10.1145/2516775.2516798
D. Genkov
Network security is an essential part of modern computer systems and networks. There are many aspects of security, but one of the modern features built in some network switches is port security -- a feature preventing network users from address spoofing, network flooding and unauthorized access through switching to another switch port. This feature is offered from some vendors, but usually it is part of the software of most advanced and expensive series switches. This paper aims to propose another implementation of port security features -- using the SNMP protocol.
网络安全是现代计算机系统和网络的重要组成部分。安全性有很多方面,但一些网络交换机内置的现代功能之一是端口安全性——该功能可以防止网络用户通过切换到另一个交换机端口而受到地址欺骗、网络泛洪和未经授权的访问。一些供应商提供此功能,但通常它是最先进和昂贵的系列交换机软件的一部分。本文旨在提出另一种实现端口安全特性的方法——使用SNMP协议。
{"title":"Implementing port security feature using SNMP protocol","authors":"D. Genkov","doi":"10.1145/2516775.2516798","DOIUrl":"https://doi.org/10.1145/2516775.2516798","url":null,"abstract":"Network security is an essential part of modern computer systems and networks. There are many aspects of security, but one of the modern features built in some network switches is port security -- a feature preventing network users from address spoofing, network flooding and unauthorized access through switching to another switch port. This feature is offered from some vendors, but usually it is part of the software of most advanced and expensive series switches. This paper aims to propose another implementation of port security features -- using the SNMP protocol.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Conference on Computer Systems and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1