- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- Advanced Photonic Communication Systems
- Network Time Synchronization Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Malware Detection Techniques
- Software System Performance and Reliability
- Human Mobility and Location-Based Analysis
- IoT and Edge/Fog Computing
- Advanced Optical Network Technologies
- Privacy-Preserving Technologies in Data
State Grid Hebei Electric Power Company
2022
Recently, IoT devices have become the targets of large-scale cyberattacks, and their security issues been increasingly serious. However, due to limited memory battery power devices, it is hardly possible install traditional software, such as antivirus software for defense. Meanwhile, network-based traffic detection difficult obtain internal behavior states conduct in-depth analysis because more use encrypted traffic. Therefore, how complex behaviors inside perform defense an issue that needs...
Due to the characteristics of small volume, low power consumption and often distributed in unattended corners, node devices IoT have become main entrance for attackers control network. In order detect abnormal nodes as early possible, we study detection methods stage capture attack this paper, combine most commonly used MQTT protocol Internet things with core idea typical methods. Under server-client architecture, heartbeat message greeting are together monitor state. Finally, a review...
To solve the problem of jitter and low network throughput caused by impact background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for flows, named hierarchical crossover mechanism based time-aware shaper (HC-TAS) improving traditional counterpart. Then, model, we designed an inbound algorithm frame length matching outbound queue status, making sure that smaller data frames will not be blocked large frames. This greatly improves utilization...
Under the current background, it is very important to study key technologies of new power system edge-to-side security protection for massive heterogeneous IoT terminals and edge agents, including defense at levels device ontology security, communication interaction secure access. Meaning. The technology has a summary impact on privacy indoor positioning. This paper proposes an positioning method based federated learning in Mobile Edge. Computing (MEC) environment. Firstly, we analyze...