Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  continuous time Markov chain
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
EN
In Personal Communication Services (PCS) networks, mobile terminals (MT) are communicating frequently using a variety of services. A high-quality framework is needed for tracking consistently MTs in the system and delivering the services timely. Future PCS networks are expected to have smaller cells to address the transmission power concerns and reuse frequencies efficiently. Thus, MTs are expected to signal even more frequently under always update (AU) strategy adopted in current PCS networks, such as GSM . One pathway for solving the problem is the consideration of Location Areas (LA). The location update takes place only when the MT moves off the area. For call delivery the area is paged. Thus, another signaling component is introduced. In this paper, we propose the design of personalized LA's (PLAs) per an individual user. The model we use takes into account the MT's behavior in the network and the system parameters. The problem is known to be NP-complete of a high computational complexity. We provide a proof of the complexity and solve the problem by using the genetic search for finding a sub-optimal solution. It is shown that the cost of location management under the model and the designed search algorithm can be significantly lower than that consumed by AU mechanism.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.