期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On the effects of contextualized explanation and Ebbinghaus Forgetting Curve on the teaching and learning of English vocabulary
1
作者 侯松山 李清澜 +1 位作者 潘建虎 张莹 《Sino-US English Teaching》 2009年第4期5-8,共4页
This paper reports the outcomes of three vocabulary tests taken by 71 second-year undergraduates, discusses the possible effects of contextualized explanation of new words and Ebbinghaus Forgetting Curve on the vocabu... This paper reports the outcomes of three vocabulary tests taken by 71 second-year undergraduates, discusses the possible effects of contextualized explanation of new words and Ebbinghaus Forgetting Curve on the vocabulary teaching and learning. The authors find that in a short duration there is a significant difference between the effect of bilingual (English & Chinese) explanation and that of monolingual (Chinese) explanation on the students' recognition of English new words. 展开更多
关键词 contextualized explanation Ebbinghaus forgetting curve vocabulary teaching and learning
在线阅读 下载PDF
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
2
作者 Lei Yan Maode Ma +3 位作者 Dandan Li Xiaohong Huang Yan Ma Kun Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期2137-2162,共26页
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic... The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods. 展开更多
关键词 Trust model CERTIFICATE SDN Crossfire attack bayesian trust system forgetting curve IOT
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部