Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

来源 :东华大学学报(英文版) | 被引量 : 0次 | 上传用户:wo6857953
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.
其他文献
A double sampling circuit to eliminating fixed pattern noise(FPN) in CMOS image sensor (CIS) is presented.Double sampling is implemented by column switch capaci
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
节能降耗长期以来一直是公司反复研讨的重点,本文根据拖轮公司拖轮作业的特点,指出了公司节能降耗的必要性,分析了影响拖轮能源消耗的主要因素,结合有关工作实际,提出了拖轮
To the problem that it is hard to determine the clustering number and the abnormal points by using the clustering validity function, an effective clustering par
The fatigue behavior of high speed steel (HSS) roll materials for hot rolling was researched under water-cooling conditions by laser impacting. The microstructu
针对低渗透油藏在开发过程中储层极易受到水锁损害的特点,对低渗透砂岩岩心进行了水锁损害研究。在分析了产生油井水锁损害机理的基础上,合成了一种含氟链阳离子双子表面活性
飞利浦收购奔腾电器一事已敲响定锤之音,先前的猜疑、否定都已经"随风而逝",留给业内面对的一个是"奔腾"品牌的消失,一个则可能是外资小家电的崛起!
A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it
To make decisions about event series is part of our life, and to discover knowledge from these decisions is of great significance in the field of controlling an