This paper proposes a control flow based security analysis approach for binary executables. Through deeply investigating the theory of control flow security, we develop the Control Flow Security Model (CFSM) which includes the formal definitions for program semantics and security properties for control flow. CFSM specifies that program execution dynamically… (More)
Network has become the main vector of information dissemination, and, the information stored and transmitted in Internet can be reflected Internet Public Opinion in period. The Sensitive topic mining study on the Internet helps us understand the Internet public opinion trends. This paper studies method about search data cluster of Internet users with… (More)
Bases on the comprehensive analysis, about the topology and control strategy of the charging system in vehicle, this paper puts forward a system design plan that has high performance, then carries on the simulation of common control strategy by MATLAB, and makes the comparative analysis of the control effect.
In a communication network, automatic short message service (SMS) spammer detection is a big challenge for a telecommunication operator nowadays, especially with the development of the rich communication services (RCS). Three main problems exist in the areas of research and real practice. They are (1) the whole-volume content based SMS spam detection… (More)
The paper aims at studying how to design and develop a virtual experiment platform, and solving the difficulties of the course experiment project for Computer Network. By creating actual 3D scene and instruments, abundant human-machine interaction, humanistic experiment tips and intellective inquiring strategies, make the students have a feeling of reality,… (More)