Learn More
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection. Moreover, we discuss the(More)
Wireless sensor networks (WSNs) are an emerging technology for monitoring physical world. Different from the traditional wireless networks and ad hoc networks, the energy constraint of WSNs makes energy saving become the most important goal of various routing algorithms. For this purpose, a cluster based routing algorithm LEACH (low energy adaptive(More)
1569-190X/$ see front matter 2010 Elsevier B.V doi:10.1016/j.simpat.2010.09.002 ⇑ Corresponding author. Tel.: +86 136936701060. E-mail addresses: sun-rz06@mails.tsinghua.edu (X. Shan), reny@tsinghua.edu.cn (Y. Ren). In this paper a new energy-aware weighted dynamic topology control (WDTC) algorithm is proposed to extend the lifetime of wireless network and(More)
Deadlock is one of the most serious problems in database system. The deadlock problem becomes further complicated if the underlying system is distributed. Distributed deadlock prevention has been studied to some extent in distributed database systems. This paper introduces brief overview of the most recent algorithm for deadlock prevention. The main(More)
Current researches on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tag and its corresponding interrogation reader. However, in many scenarios, instead of stealing detailed private information of tags, adversaries aim at estimating the cardinality of tags, which is called counting(More)
In this paper, we propose a Network-based NEtwork MObility supporting scheme (N-NEMO) in Proxy Mobile IPv6 (PMIPv6) network, which is an issue still up in the air for the basic PMIPv6 protocol. The N-NEMO, like PMIPv6, bases mobility support on network functionality, thus enabling conventional (i.e., not mobility-enabled) IP devices to change their point of(More)