Chenghua Tang

Learn More
—More and more Internet services and applications are transferred by the HTTP protocol due to its openness. This brings new challenges to the security management of network boundary. In this paper, a new approach is proposed to detect the pseudo Web behavior which abuses the general HTTP protocol to pass through the network boundary. A new parameter is(More)
To solve the shortage problem of the semantic description scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the(More)
Power line communication (PLC) has recently been receiving widespread attention due to its applications in the smart grid. We present a comparative study on the call-level performance of PLC networks with and without buffer through queueing theory. The PLC network model consists of a base station (BS) and a number of subscriber stations that are(More)
—In order to solve the implementation and realization efficiency problem of the network information system security policy, an improved object-oriented Rete algorithm and its network structure model are proposed, and on this basis, the rule engine is introduced, where the implementation and realization steps and efficiency analysis are given. Result shows(More)
Security situation is the premise of network security warning. For lack of self-learning on situation data processing in existing complex network, a modeling and analysis of network security situation prediction based on covariance likelihood neural is presented. With the introduction of the error covariance likelihood function, and considering the impact(More)
In order to obtain the large quantities of valuable information on Deep Web, it is required to discover the related individual query interface and design the integrated query interface on which user query request can be submitted. The key challenges are to identify and classify the Deep Web query interface accurately. In view of the regular data of Deep(More)