期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
隐蔽信道新型分类方法与威胁限制策略 被引量:11
1
作者 王翀 王秀利 +4 位作者 吕荫润 张常有 吴敬征 关贝 王永吉 《软件学报》 EI CSCD 北大核心 2020年第1期228-245,共18页
隐蔽信道是指恶意通信双方通过修改共享资源的数值、特性或状态等属性,来编码和传递信息的信道.共享资源的选取,由隐蔽信道的类型与具体通信场景所决定.早期,存储隐蔽信道和时间隐蔽信道主要存在于传统操作系统、网络和数据库等信息系统... 隐蔽信道是指恶意通信双方通过修改共享资源的数值、特性或状态等属性,来编码和传递信息的信道.共享资源的选取,由隐蔽信道的类型与具体通信场景所决定.早期,存储隐蔽信道和时间隐蔽信道主要存在于传统操作系统、网络和数据库等信息系统中.近年来,研究重点逐渐拓展到了3类新型隐蔽信道,分别为混合隐蔽信道、行为隐蔽信道和气隙隐蔽信道.对近年来国内外隐蔽信道研究工作进行了系统的梳理、分析和总结.首先,阐述隐蔽信道的相关定义、发展历史、关键要素和分析工作.然后,根据隐蔽信道共享资源的类型以及信道特征,提出新的隐蔽信道分类体系.首次从发送方、接收方、共享资源、编码机制、同步机制、评价指标和限制方法这7个方面,对近年来新型隐蔽信道攻击技术进行系统的分析和归纳,旨在为后续隐蔽信道分析和限制等研究工作提供有益的参考.进而,讨论了面向隐蔽信道类型的威胁限制技术,为设计面向一类隐蔽信道的限制策略提供研究思路.最后,总结了隐蔽信道中存在的问题和挑战. 展开更多
关键词 隐蔽通信 隐蔽信道 隐蔽信道分类 信息隐藏 行为隐蔽信道
在线阅读 下载PDF
Adding regular expressions to graph reachability and pattern queries 被引量:2
2
作者 Wenfei FAN Jianzhong LI +2 位作者 Shuai MA Nan TANG Yinghui WU 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第3期313-338,共26页
It is increasingly common to find graphs in which edges are of different types, indicating a variety of relation- ships. For such graphs we propose a class of reachability queries and a class of graph patterns, in whi... It is increasingly common to find graphs in which edges are of different types, indicating a variety of relation- ships. For such graphs we propose a class of reachability queries and a class of graph patterns, in which an edge is specified with a regular expression of a certain form, ex- pressing the connectivity of a data graph via edges of var- ious types. In addition, we define graph pattern matching based on a revised notion of graph simulation. On graphs in emerging applications such as social networks, we show that these queries are capable of finding more sensible informa- tion than their traditional counterparts. Better still, their in- creased expressive power does not come with extra complex- ity. Indeed, (1) we investigate their containment and mini- mization problems, and show that these fundamental prob- lems are in quadratic time for reachability queries and are in cubic time for pattern queries. (2) We develop an algorithm for answering reachability queries, in quadratic time as for their traditional counterpart. (3) We provide two cubic-time algorithms for evaluating graph pattern queries, as opposed to the NP-completeness of graph pattern matching via subgraph isomorphism. (4) The effectiveness and efficiency of these al- gorithms are experimentally verified using real-life data and synthetic data. 展开更多
关键词 graph reachability graph pattern queries regu-lar expressions CONTAINMENT equivalence minimization
原文传递
DEEPEYE: An Automatic Big Data Visualization Framework 被引量:3
3
作者 Xuedi Qin Yuyu Luo +1 位作者 Nan Tang Guoliang Li 《Big Data Mining and Analytics》 2018年第1期75-82,共8页
Data visualization transforms data into images to aid the understanding of data; therefore, it is an invaluable tool for explaining the significance of data to visually inclined people. Given a(big) dataset, the essen... Data visualization transforms data into images to aid the understanding of data; therefore, it is an invaluable tool for explaining the significance of data to visually inclined people. Given a(big) dataset, the essential task of visualization is to visualize the data to tell compelling stories by selecting, filtering, and transforming the data, and picking the right visualization type such as bar charts or line charts. Our ultimate goal is to automate this task that currently requires heavy user intervention in the existing visualization systems. An evolutionized system in the field faces the following three main challenges:(1) Visualization verification: to determine whether a visualization for a given dataset is interesting, from the viewpoint of human understanding;(2) Visualization search space: a "boring" dataset may become interesting after an arbitrary combination of operations such as selections,joins, and aggregations, among others;(3) On-time responses: do not deplete the user's patience. In this paper,we present the DEEPEYE system to address these challenges. This system solves the first challenge by training a binary classifier to decide whether a particular visualization is good for a given dataset, and by using a supervised learning to rank model to rank the above good visualizations. It also considers popular visualization operations, such as grouping and binning, which can manipulate the data, and this will determine the search space. Our proposed system tackles the third challenge by incorporating database optimization techniques for sharing computations and pruning. 展开更多
关键词 BIG DATA AUTOMATIC DATA VISUALIZATION VISUALIZATION verification VISUALIZATION RANKING VISUALIZATION SEARCH space
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部