P2P Botnet Detection Using Min-Vertex Cover
|
|
- Bathsheba Chase
- 5 years ago
- Views:
Transcription
1 1176 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 P2P Botnet Detection Using Min-Vertex Cover Lei Xu College of computer, Nanjing University of Posts and Telecommunications, Nanjing, China 1, 2 XiaoLong Xu and 1 Yue Zhuo 1 College of computer, Nanjing University of Posts and Telecommunications, Nanjing, China 2 State Key Laboratory of Information Security (Institute of Software, Chinese Academy of Sciences), Beijing , China xuxl@njupt.edu.cn, michellezhuo26@gmail.com Abstract P2P botnet is one of the most critical threats to the current Internet security. In this paper, we propose a session-based analysis and minimum vertex cover mining detecting model for core nodes of P2P botnets. This model is focused on solving the core nodes of botnet and has a good performance when the characteristics of botnet are changed to avoid detecting. The simulation experiments reveal that when the session detection rate is at 50% and session falsepositive rate is at 29%, the core node detection rate still remains 98.9%, and the false-positive rate of core node is only 4.87%. Index Terms Network security, Botnet detection, Session analysis, Minimum vertex cove, Core nodes I. INTRODUCTION Botnets are the networks that attacker, for malicious purposes, controls masses of hosts by spreading bots, and then takes use of the command and control channels to communicate[1]. Botnets are not analogous to worms and viruses that cause harm to the computers directly, but to provide a platform for the attacker, who can use this platform for DDOS, spam and some other attacks. Early botnets were mainly based on the IRC protocol and HTTP protocol. With the P2P technology extensively applied in the network, there appeared P2P-based botnets. P2P botnets have many merits compared to centralized botnets (Based on IRC or HTTP protocol), they no longer requires a specific central server, hence the botnets avoid the problem of single point failure and they behave more flexible due to their command and control channels, which make it difficult to track for the attacker. Currently, Researchers proposed several new P2P botnet models, which correct some shortcomings of early botnets and become more difficult to detect and defend. Zhang et al. summed up the shortcomings of of existing botnet models, and proposed some approaches to strengthen the botnet [2]. Wang et al. introduced a new hybrid P2P botnet, in which the bots are divided into two roles, Client bots and Server bots. Using data encryption and personalized service ports, the botnet has a strong robustness and invisibility [3]. Of course, there are many researches are focused on the detection and prevention of botnets. Against the early centralized botnet, many approaches have been proposed [4~8]. Wang et al. and Goebel et al. proposed detecting methods for IRC botnets by the use of similarity of nickname of bots. Gu et al. presented BotSniffer, which can capture spatial-temporal correlation in network traffic and utilize their statistical algorithms to detect botnets. In real-world experiments, BotSniffer shows a high accuracy and has a very low false-positive rate. These methods needn t priori knowledge, and meet the needs of real-time detection. But they aren t appropriate for P2P botnet detection. Recently, network traffic and behavior analysis are popular approaches for P2P botnet detection [9~12]. Liao et al. proposed a P2P botnet detection method based on traffic monitoring and data mining technology [9], and pointed out the difference between behaviors of botnet traffic and those of normal network traffic. Hossein et al. posed a general P2P botnet detection framework [10], which monitored a group of hosts to find out the malicious network traffic and behaviors. However, these methods have some defects. For example, if the characteristics of botnet change, the success rate of detection will sharply decline. Yun et al. put forward a detection measure based on hop distance [13], which compares the communication hop distance with the IP block detection threshold from start point to end point to judge whether they are botnets. This method is merely applied to detect P2P botnet which based on spam attack. As P2P botnet traffic shows a power-law distribution [19] feature, most of the traffic of botnets is passed though several important nodes, we call them core nodes. Hence, the core nodes can represent the entire botnet s behavior performance to a great extent. Additionally, the connectivity of a botnet bears so much on its core nodes that it becomes isolated parts with losing of core nodes. In this sense, if a defender of botnets can find out the core nodes of botnet and then monitor them, he can detect and defend botnets in effect. In this paper, we present a novel P2P botnet detection model that combines session-based analysis doi: /jnw
2 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST network traffic Session analysis module TCP process Induce character Core node calculation Construct undirected graph Calculate min vertex cover white list filter Analyze suspicious degree UDP process Induce character core nodes table white list filter Analyze suspicious degree session table Figure 1. Session-based analysis and minimum vertex cover mining P2P botnet detection model and minimum vertex cover theory, this model only analyzes network header information, regardless of extra network data load, and takes use of minimum vertex cover to probe the core nodes of botnet. In addition, it maintains a high success rate even if the attacker changes the features of botnets to counterattack. The rest of this paper is organized as follows. Section II describes our P2P botnet detection model including network session analysis and core nodes excavating. Section III gives simulation experiments about our algorithm to solve core nodes of botnet. In Section IV, we draw a conclusion about our paper. II. BOTNET DETECTION METHOD A. Detection and Defense Model We present a detection model with session-based analysis and the minimum vertex cover theory. In Fig. 1, the model can be run on the network gateway, utilize the SPAN technology[20] to gain network traffic, then network session analysis module conducts statistics and analysis of the traffic characteristics. The analysis results will be stored into the session table in the database. And then core node calculation module, via session table, structures a simple undirected graph which represents the botnet. Using the algorithm mentioned below, we calculate the core nodes of network, and save them into the core nodes table. Furthermore, the content of core nodes table will back feed to network session analysis module, in order to induct and adjust the attributes of botnets. B. Network Session Analysis 1) Session Table P2P botnet traffic has some different characters in comparison with normal Internet traffic [9][14]. Such as, packets of P2P botnets are mainly in small size (data portion less than 100 bytes). Accordingly, we structure a session table to count and analyze the properties of network communications. The following shows the process of establishing a session table. In a period of time, we regard 32-bits-integer IP address as the identifier and compile statistics for certain features of network traffic. Besides the IP addresses and characteristics parameters, the session table also has a suspicious degree attribute which describes the possibility of the session to be a bot-session. In Table I, we established a session table including two sessions with parameter of small packet rate. TABLE I. Address 1 Address 2 A SESSION TABLE WITH SMALL PACKET RATE Small packet rate Suspicious degree ) Suspicious Degree Analysis In a session table which includes X1, X 2,..., X n parameters, we analyze these parameters, then determine whether the session is a bot or not. Definition 1 Bot-Session Possibility: in session table, the probability that the current session is the bot session is Bot-Session Possibility, its mathematical expression is: Bot ( s) P( s is bot session X1 x1, X2 x 2,..., Xn xn ) (1) s represents current session, X1, X2,..., X n represents characteristic parameters, x1, x2,..., xn is the statistic of the characteristic parameters corresponding to current session. By the use of Bayes theorem, B ot(s) can be rewritten as: PX ( 1 x1, X2 x2,..., Xn xns is bot session) Ps ( is bot session ) Bot () s PX ( 1 x1, X2 x2,..., Xn xn ) (2)
3 1178 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 Because of Ps ( is bot session )and PX (1 x1, X2 x2,..., Xn xn)is constant value for a period of time, and assume that X 1, X 2,..., Xn parameters are independent random variables, then B ot(s) can be further adapted as : Bot ( s) C P( X x s is bot session )... P( X x 1 1 n n s is bot session) (3) In order to quantify the bot-like probability of current session, take the logarithmic processing for B ot(s) : n log( Bot ( s)) log( C) log( P( Xi xi s is bot session)) (4) i 1 If the bot-sessions confidence interval is Ai,then gives: 1, xi Ai log( PX ( i xi s is bot session)) (5) 0, xi Ai We provide the definition of Bot-Session Suspicious Degree: Definition 2 Bot-Session Suspicious Degree: in session table, a definite value that represents the session bot-like degree is Bot-Session Suspicious, its mathematical expression is: n EST() s log( P( Xi xi s is bot session)) (6) i 1 Set the threshold value m(1 m n 1), if EST ( s) m, then regard the session as normal, or as a bot-session. 3) Character Induction As P2P botnet traffic shows a power-law distribution feature, hence the core nodes can take the gauge of entire botnet s behavior performance. Taking into consideration the problem that interference of normal network traffic and changes of botnet characteristics will bring to the potential increase in false-positive rate of botnet detection, we apply botnet core nodes to estimate the botnet traffic characteristics for further induction and adjustment. We cam use some methods to get the interval for determining botnets. For example, if mean value of certain botnet traffic characteristic parameters Xi( i 1,2,..., n) which come from core nodes table approximately meet normal distribution, we can calculate the average value X and variance S 2 of Xi, and select (0 1), then confidence interval Ai is : S S ( X t ( m 1), X t ( m 1)) m 1 m 1 (7) 2 2 We use A i as the range during inducting characteristics parameter, when sessions carry on suspicious degree analysis, if the relevant statistical parameters falls within A i, the session s suspicious degree will correspondingly increase. C. Solve Core Nodes With Minimum Vertex Cover According to the session table, we create a simple undirected graph G. In the graph, both sides of session is transformed to vertex v, and session is converted to edge e, the weight of edge we ( ) represents the bot-session suspicious degree. Therefore the task of seeking for the core nodes can be converted to the problem of solving the minimum vertex cover of G. Definition 3 Minimum Vertex Cover: Give F V( G), if every edge of the graph G has at least one vertex that belongs to set F, then set F is one of the vertex covers of G. If F has min sum of vertex weight, then F is the minimum vertex cover of G. Solving minimum vertex cover [15] is a NP-complete problem, but scholars put forward many approximate algorithms [16~18]. Balaji et al. introduced SRA algorithm, its worst time complexity is Omn ( 2 ). We take advantage of SRA algorithm and put forward solving algorithm of botnet core nodes: Give that minimum vertex cover is Vc, core nodes set is Core, select rate is. Step1 Build simple undirected graph G ( V, E), set the value of edge weight we ( ) with session suspicious degree, and set Vc. Step2 Calculate each vertex s weight wv ( ), wv ( ) w(e), v0 V. ( vv, 0 ) E Step3 Calculate each vertex s support degree s( v ), s( v) w( v0), v0 v ( vv, 0 ) E. Step4 Calculate each vertex s sum degree sum( v ), sum( v) w( v) s( v). Step5 Traverse vertex set V,look for vertex v : sum( v) max{ sum( v1), sum( v2),..., sum( vn)}, vi V then add v to Vc and delete the edges relevant to v. Step6 Repeat Step 2 to Step 5, until E. Step7 Sort Vc according to the added time order, then the set of core nodes of botnet is: Core { vi vi Vc AND i Vc }. III. SIMULATION EXPERIMENTS AND RESULTS ANALYSIS A. Experiments Design Simulation on a PC implements 2000-nodes network, which contains 200 bots and randomly select 10% bots to be core nodes, the distribution of bots refer to the botnet model in [3]. Whereas some other P2P applications will disturb session analysis, we layout 5 P2P application networks that draw on the P2P application networks traffic traits in [21]. P2P botnet detection picks individual
4 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST Figure 2. the relationship between session detection rate and core nodes detection rate Figure 4. the distribution of false-positives in core nodes set Figure 3. the relationship between detection false -positive rate and core nodes false-positive rate Figure 5. the influence of select rate on core nodes detection feature parameter, and preset detection rate and falsepositive rate, and then we will test if the algorithm in section II is effective. B. Experiments Data Analysis In the case that session analysis detection rate and false-positive rate is known, the success rate of core nodes mining of proposed algorithm is in Fig. 2. We can see even though the session detection rate is not fine, the algorithm works well. However, Fig. 3 indicates that, since minimum vertex cover all edges of graph, including the edges belonged to mistake detection result and pseudo bot-like sessions have a lower connectivity than bot-sessions, the solved core nodes have a higher falsepositive. We found that, if core nodes are displayed by added time sort according to our algorithm, the top 20% nodes have a very low false-positive as shown in Fig. 4. Accordingly, we choose the session detection rate as 60% and session false-positive rate as 25%, then via change the minimum vertex cover select rate to observe the core nodes detection rate and false-positive rate in Fig. 5. It reveals that the detection rate of core nodes always Figure 6. core nodes detection under 20% select rate remain high and false-positive rate almost performs a liner growth with select rate when select rate is below 20%. Finally, balancing the relationship between detection rate and false-positive rate, we set the select rate as 20% and examine the detections of core nodes with various session detections in Fig. 6. The result shows that the false-positive is much lower than that of session detection
5 1180 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 and core nodes detection rate decrease slightly compared to that of 100% select rate. Particularly, when the session was at 50% detection rate and 29% false-positive rate, the core nodes detection rate reached 98.9%, while the falsepositive rate was 4.87%. IV. CONCLUSION As core nodes play a significant role in botnets running and current P2P botnet detection methods still remain some deficiencies, we presents a detection model based on session analysis and minimum vertex cover theory. The system can excavate the core nodes of botnet while there is no guarantee on detection rate and false-positive rate of bots. Furthermore it can use the core nodes to induce the features of botnet, which are feedback to system to increase detection efficiency at next time. The algorithm for solving the core nodes in the simulation results shows a finer performance in face of poor session detection rate and false-positive rate. ACKNOWLEDGEMENT The subject is sponsored by the National Key Basic Research Program (973 Program) of China (No. 2011CB302903), the National Natural Science Foundation of China (No ), the Specialized Research Fund for the Doctoral Program of Higher Education (No , No ), the China Postdoctoral Science Foundation Funded Project (No.2011M500095), the Natural Science Foundation of Jiangsu Province (No. BK , No. BK ), the Jiangsu Postdoctoral Science Foundation Funded Project (No C), the Science and Technology Support Program of Jiangsu Province (No. BE )and the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(No.yx002001). REFERENCES [1] Jianwei Zhuge, Xinhui Han, Yinglin Zhou, Zhuyuan Ye and Wei Zou, Research and development of botnets, Journal of Software, vol. 19, Mar. 2008, pp [2] Zonghu Zhang, Ando Ruo and Kadobayashi Youki, Hardening botnet by a rational botmaster, 4 th International Conference on Information Security and Cryptology, [3] Ping Wang, Sherri Sparks and Cliff C. Zou, An advanced hybrid peer-to-peer botnet, IEEE Transactions on Dependable and Secure Computing, vol. 7, 2010, pp [4] Wei Wang, Binxing Fang and Cui Xiang, IRC botnet detection based on host behavior, Chinese Journal of Computers, vol. 32, Oct. 2009, pp [5] Guofei Gu, Junjie Zhang and Wenke Lee, BotSniffer:Detecting Botnet Command and Control Channels innetwork Traffic, 15 th Annual Network and Distributed System Security Symposium (NDSS 2008), [6] Wei Wang, Binxing Fang, Zhaoxin Zhang and Chao Li, A novel approach to detect IRC-based botnets, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), Apr [7] Jan Goebel and Thorsten Holz, Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation, 1 st Conference on Hot Topics in Understanding Botnets(HotBots 2007),CA USA, [8] Wei Lu and A A. Ghorbani, Botnets Detection Based on IRC-Community, IEEE Global Telecommunications Conference (GLOBECOM 2008), [9] Wenhwa Liao and Chiaching Chang, Peer to Peer detection data mining scheme, International Conference on Internet Technology and Applications (ITAP 2010), Agu [10] Zeidanloo Hossein Rouhani, Manaf Azizah Bt, Vahdani Payam, Tabatabaei Farzaneh and Zamani Mazdak, Botnet detection based on traffic monitoring, International Conference on Networking and Information Technology (ICNIT 2010), June [11] Dan Liu, Yichao Li, Yue Hu and Zongwen Liang, A P2Pbotnet detection model and algorithms based on network streams analysis, 2010 International Conference on Future Information Technology and Management Engineering (FITME 2010), Oct [12] Chang Su and Thomas E. Daniels, P2P botnet detection using behavio clustering & statistical tests, ACM Conference on Computer and Communications Security (AISec 09), Nov [13] Sanqki Yun, Byunqseung Kim, Saewoong Bahk and Hyoqon Kim, Identifying IP blocks with spamming bots by spatial distribution, IEICE Transactions on Communications, vol. E93-B, Aug. 2010, pp [14] Alexander K. Seewald and Wilfried N. Gansterer, On the detection and identification of botnets, Computers and Security, vol. 29, Feb. 2010, pp [15] M. R. Garey, D. S. Johnson and L. Stockmeyer, Some simplified NP-complete problems, 6 th annual ACM symposium on Theory of computing(stoc 74), New York, USA, [16] S. Balaji, V. Swaminathan and K. Kannan, An effective algorithm for minimum weighted vertex cover problem, International Journal of Computational and Mathematical Sciences, vol. 4, Winter 2010, pp [17] Mingyu Xiao, Jianer Chen and Xuli Han, Improvement on vertex cover and independent set problem for low-degree graphs, Chinese Journal of Computers, vol. 28, Feb. 2005, pp [18] Mingyu Xiao, A note on vertex cover in graphs with maximum degree 3, Lecture Notes in Computer Science, vol. 6196, 2010, pp [19] Duanbin Chen, Ying Wan, Junwei Tian and Yan Fu, A P2P botnet control strategy based on social network analysis, Jisuanji Kexue, vol.6, 2009, pp [20] SPAN, lyst6500/ios/12.2sxf/native/configuration/guide/span.html #wp [21] Marios Iliofotou, Hyunchul Kim, Michalis Faloutsos, Michael Mitzenmacher, Prashanth Pappu and George Varghese, Graption: A graph-based P2P traffic classification framework for the internet backbone, Computer Networks, vol. 55, June. 2011, pp
6 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST Lei Xu is an undergraduate in the college of computer at Nanjing University of Posts and Telecommunications. His research interests include computer nework and information security. Xiaolong Xu graduated from Nanjing University of Posts and Telecommunications (NUPT), China, in He received the M.E. degree from NUPT in 2002 and the ph.d degree from NUPT, China, in He is currently an asociate profesor at College of Computer, NUPT. His research interests include computer software, distributed computing, senor networks and information security. Yue Zhuo is an undergraduate in the college of computer at Nanjing University of Posts and Telecommunications. His research interest is information security.
Multi-phase IRC Botnet & Botnet Behavior Detection Model
Software Verification and Validation Multi-phase IRC Botnet & Botnet Behavior Detection Model Aymen AlAwadi aymen@tmit.bme.hu Budapest university of technology and economics Department of Telecommunications
More informationBotnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran
08-08-2011 Guide: Dr. B Ravindran Outline 1 Introduction 2 3 4 5 6 2 Big Picture Recent Incidents Reasons for Study Internet Scenario Major Threats Flooding attacks Spamming Phishing Identity theft, etc.
More informationANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS
ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,
More informationBotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts
2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer
More informationOutline. Motivation. Our System. Conclusion
Outline Motivation Our System Evaluation Conclusion 1 Botnet A botnet is a collection of bots controlled by a botmaster via a command and control (C&C) channel Centralized C&C, P2P-based C&C Botnets serve
More informationP2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b
2nd International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2017) P2P Botnet Detection Method Based on Data Flow Wang Jiajia 1, a Chen Yu1,b 1 Taizhou Pylotechnic
More informationA method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids
5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A method of three-dimensional subdivision of arbitrary polyhedron by using pyramids LIU Ji-bo1,a*, Wang Zhi-hong1,b,
More informationMulti-Stream Fused Model: A Novel Real-Time Botnet Detecting Model
Bonfring International Journal of Data Mining, Vol. 7, No. 2, May 2017 6 Multi-Stream Fused Model: A Novel Real-Time Botnet Detecting Model Jae Moon Lee and Thien Nguyen Phu Abstract--- In the current
More informationA Method and System for Thunder Traffic Online Identification
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More informationOrganization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology
, pp.49-54 http://dx.doi.org/10.14257/astl.2014.45.10 Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology Ying Xia, Shiyan Luo, Xu Zhang, Hae Yong Bae Research
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationAn Improved Pre-classification Method for Offline Handwritten Chinese Character Using Four Corner Feature
ISBN 978-952-5726-04-6 (Print), 978-952-5726-05-3 (CD-ROM) Proceedings of the International Symposium on Intelligent Information Systems and Applications (IISA 09) Qingdao, P. R. China, Oct. 28-30, 2009,
More informationA New Logging-based IP Traceback Approach using Data Mining Techniques
using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH
More informationA Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of
More informationThe Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1461-1465 1461 Open Access The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying
More informationAn improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1,
More informationPrivacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationAdaptive Doppler centroid estimation algorithm of airborne SAR
Adaptive Doppler centroid estimation algorithm of airborne SAR Jian Yang 1,2a), Chang Liu 1, and Yanfei Wang 1 1 Institute of Electronics, Chinese Academy of Sciences 19 North Sihuan Road, Haidian, Beijing
More informationCombining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*
Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,
More informationA REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES
Journal of Computer Science 10 (1): 169-177, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.169.177 Published Online 10 (1) 2014 (http://www.thescipub.com/jcs.toc) A REVIEW OF PEER-TO-PEER BOTNET DETECTION
More informationANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit
ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit Liangyu Ma, Zhiyuan Gao Automation Department, School of Control and Computer Engineering
More informationThe Comparative Study of Machine Learning Algorithms in Text Data Classification*
The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification
More informationThe Evaluation of Hash Algorithm based on Flows in the Network Equipment
The Evaluation of Hash Algorithm based on Flows in the Network Equipment Xin Zou 1, Li Zhou 1, Liangyi Gong 1 National Computer Network & Information Security Administrative Center, Beijing 10009, P.R.China
More informationGraph-based Detection of Anomalous Network Traffic
Graph-based Detection of Anomalous Network Traffic Do Quoc Le Supervisor: Prof. James Won-Ki Hong Distributed Processing & Network Management Lab Division of IT Convergence Engineering POSTECH, Korea lequocdo@postech.ac.kr
More informationREPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationA Design of Remote Monitoring System based on 3G and Internet Technology
National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract
More informationDetecting Spam Zombies By Monitoring Outgoing Messages
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.71-75 Detecting Spam Zombies By Monitoring Outgoing Messages
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(7): Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):1055-1063 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The novel approach of P2P Botnet Node-based detection
More informationAccuracy of Matching between Probe-Vehicle and GIS Map
Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 59-64 Accuracy of Matching between
More informationThe Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm
01 International Conference on Image, Vision and Computing (ICIVC 01) IPCSI vol. 50 (01) (01) IACSI Press, Singapore DOI: 10.7763/IPCSI.01.V50.56 he Improved Embedded Zerotree Wavelet Coding () Algorithm
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationPerformance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM
Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.
More informationMitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems
More informationReal-time Aerial Targets Detection Algorithm Based Background Subtraction
Real-time Aerial Targets Detection Algorithm Based Background Subtraction Mao Zheng, Zhen-Rong Wu, Saidsho Bakhdavlatov, Jing-Song Qu, Hong-Yan Li, Jian -Jian Yuan (College of Electronic and control Engineering,
More informationEnergy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks
Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink
More informationAdjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs
Journal of Mathematical Research & Exposition Mar., 2011, Vol. 31, No. 2, pp. 366 370 DOI:10.3770/j.issn:1000-341X.2011.02.022 Http://jmre.dlut.edu.cn Adjacent Vertex Distinguishing Incidence Coloring
More informationBotDigger: A Fuzzy Inference System for Botnet Detection
The Fifth International Conference on Internet Monitoring and Protection BotDigger: A Fuzzy Inference System for Botnet Detection Basheer Al-Duwairi Network Engineering and Security Department Jordan University
More informationData Structure Optimization of AS_PATH in BGP
Data Structure Optimization of AS_PATH in BGP Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract. With the
More informationA Static-Dynamic Conjunct Windows Process Integrity Detection Model
A Static-Dynamic Conjunct Windows Process Integrity Detection Model Fei Chen 1, Yi Li 1, Tong Zhang 1, Kehe Wu 1, 1 North China Electric Power University, Department of Control and Computer Engineering,
More informationZigBee Routing Algorithm Based on Energy Optimization
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationThe Key Technology and Algorithm Design for the Development of Intelligent Examination System
6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015) The Key Technology and Algorithm Design for the Development of Intelligent Examination System Kai Lu1, a * and Mingrui
More informationAn Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database
Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management
More informationImprovement of SURF Feature Image Registration Algorithm Based on Cluster Analysis
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya
More informationStudy on Simulated ZMW Attack. Xingman Chen, Yanhui Guo, Qi Li
5th International Conference on Education, Management, Information and Medicine (EMIM 2015) Study on Simulated ZMW Attack Xingman Chen, Yanhui Guo, Qi Li Beijing University of Post and Telecommunications,
More informationNew-fangled Method against Data Flooding Attacks in MANET
New-fangled Method against Data Flooding Attacks in MANET Kavuri Roshan 1, K.Reddi Prasad 2, Niraj Upadhayaya 3 & A.Govardhan 4 1, 2&3 Department of Computer Science & Information Technology, J.B. Institute
More informationA multi-step attack-correlation method with privacy protection
A multi-step attack-correlation method with privacy protection Research paper A multi-step attack-correlation method with privacy protection ZHANG Yongtang 1, 2, LUO Xianlu 1, LUO Haibo 1 1. Department
More information@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India
Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.
More informationA Spherical Placement and Migration Scheme for a STT-RAM Based Hybrid Cache in 3D chip Multi-processors
, July 4-6, 2018, London, U.K. A Spherical Placement and Migration Scheme for a STT-RAM Based Hybrid in 3D chip Multi-processors Lei Wang, Fen Ge, Hao Lu, Ning Wu, Ying Zhang, and Fang Zhou Abstract As
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationDetecting Botnets Using Cisco NetFlow Protocol
Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software
More informationDesign of student information system based on association algorithm and data mining technology. CaiYan, ChenHua
5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology
More informationA Game Map Complexity Measure Based on Hamming Distance Yan Li, Pan Su, and Wenliang Li
Physics Procedia 22 (2011) 634 640 2011 International Conference on Physics Science and Technology (ICPST 2011) A Game Map Complexity Measure Based on Hamming Distance Yan Li, Pan Su, and Wenliang Li Collage
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationResearch on QR Code Image Pre-processing Algorithm under Complex Background
Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationSTUDYING OF CLASSIFYING CHINESE SMS MESSAGES
STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2
More informationHFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging
007 International Conference on Convergence Information Technology HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging Lixin Han,, Guihai Chen Department of Computer Science and Engineering,
More informationA Review- Botnet Detection and Suppression in Clouds Miss Namrata A. Sable #1, Prof. Dinesh S. Datar #2
A Review- Botnet Detection and Suppression in Clouds Miss Namrata A. Sable #1, Prof. Dinesh S. Datar #2 #1 M.E.(Computer science & Engineering, #2 Assistant Professor # Department of Computer Science &
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationThe application of a kind of duplex layer KMP algorithm within flow filtering technology
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(9):515-521 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The application of a kind of duplex layer KMP algorithm
More informationText Clustering Incremental Algorithm in Sensitive Topic Detection
International Journal of Information and Communication Sciences 2018; 3(3): 88-95 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.12 ISSN: 2575-1700 (Print); ISSN: 2575-1719
More informationRandom Neural Networks for the Adaptive Control of Packet Networks
Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationA Review-Botnet Detection and Suppression in Clouds
A Review-Botnet Detection and Suppression in Clouds Namrata A. sable M.E.(CSE) G. H. Raisoni College of Engineering & Management, Amravati SGBAU, Amravati University Amravati(MS), India E-mail: namratasable10@gmail.com
More informationResearch on Mining Cloud Data Based on Correlation Dimension Feature
2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Research on Mining Cloud Data Based on Correlation Dimension Feature Jingwen
More informationA New Distance Independent Localization Algorithm in Wireless Sensor Network
A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key
More informationDesign Universal Security Scheme for Broadband Router
International Journal of Security, Vol.10, No.2, PP.81 86, Mar. 2010 81 Design Universal Security Scheme for Broadband Router Xiaozhuo Gu 1,2 and Jianzu Yang 2 (Corresponding author: Xiaozhuo Gu) National
More informationIP Packet Filtering using Hash Table for Dedicated Real Time IP Filter
I.J. Wireless and Microwave Technologies, 2017, 1, 24-29 Published Online January 2017 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2017.01.03 Available online at http://www.mecs-press.net/ijwmt
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationThe Research of Delay Characteristics in CAN Bus Networked Control System
Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming
More informationA new improved ant colony algorithm with levy mutation 1
Acta Technica 62, No. 3B/2017, 27 34 c 2017 Institute of Thermomechanics CAS, v.v.i. A new improved ant colony algorithm with levy mutation 1 Zhang Zhixin 2, Hu Deji 2, Jiang Shuhao 2, 3, Gao Linhua 2,
More informationDESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM
DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM Wu Di, Li Dezhi and Wang Zhenyong School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12918-12922] Research on motion tracking and detection of computer
More informationStudy on Image Position Algorithm of the PCB Detection
odern Applied cience; Vol. 6, No. 8; 01 IN 1913-1844 E-IN 1913-185 Published by Canadian Center of cience and Education tudy on Image Position Algorithm of the PCB Detection Zhou Lv 1, Deng heng 1, Yan
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationMulti-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Copyright 2018 Tech Science Press CMC, vol.57, no.2, pp.297-306, 2018 Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Chak Fong Cheang 1, *, Yiqin Wang 1, Zhiping Cai 2 and
More informationTest Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang
More informationInternational Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,
More informationAn Embedded Dynamic Security Networking Technology Based on Quick Jump and Trust
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 014, 8, 579-585 579 Open Access An Embedded Dynamic Security Networking Technology Based on Quick Jump and
More informationEstimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen
Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Southeast University of China University of Florida Motivation for Persistent Stealthy Spreaders Imagine
More informationMODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and
More informationNext Generation Campus Network Deployment Project Based on Softswitch
I.J. Wireless and Microwave Technologies, 2011, 4, 47-54 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2011.04.07 Available online at http://www.mecs-press.net/ijwmt
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationDesign of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice
Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice 1 CUI Kai, 2 LI Ke-dan, 1 CHEN Fu-xing, 1 ZHU Zhi-pu, 1 ZHU Yue-sheng 1. Shenzhen Eng. Lab of Converged Networks
More informationDistributed Pub/Sub Model in CoAP-based Internet-of-Things Networks
Distributed Pub/Sub Model in CoAP-based Internet-of-Things Networks Joong-Hwa Jung School of Computer Science and Engineering, Kyungpook National University Daegu, Korea godopu16@gmail.com Dong-Kyu Choi
More informationA Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.
A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R
More informationModeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML
2018 International Conference on Modeling, Simulation and Optimization (MSO 2018) ISBN: 978-1-60595-542-1 Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML
More informationMubug: a mobile service for rapid bug tracking
. MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More information