Learn More
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the most important newly threat of the network security. In this paper, the propagation process of active P2P worms are studied by a dynamic model over the overlay topology which modeled as a power-law undirected graph. Firstly, GLP power law generator is used to(More)
Due to the unidirectional isolation characteristics of state grid secure access platform, it is an important research problem of the full tracking of transmission line. Furthermore, it is crucial for full tracking transmission line to be succeeded to transfer the data of video monitoring network to the internal network smoothly. In this paper, we analyze(More)
In recent years, social spammers become rampant and evolve a number of variations in most social networks. In micro-blogging community, there are a typical type of anomalous groups consisting of cooperative and organized spammers, and they are hired by public relation companies and paid for posting tweets with certain content. They intentionally evolve(More)
—In order to achieve large-scale Trojan control in an effective way, a Trojan control model based on layered and P2P structure has been proposed in this paper. According to our model a hundred thousand magnitude Trojan server could be under control. This model could adjust the number of Trojan dynamically by revising the layer number. In addition, the load(More)