Institute of Command Automation

Nanjing, China

Institute of Command Automation

Nanjing, China

Time filter

Source Type

Liu W.,Nanjing University of Information Science and Technology | Liu J.,Nanjing University of Information Science and Technology | Cui M.,Nanjing University of Information Science and Technology | He M.,Institute of Command Automation
Proceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010 | Year: 2010

With utilizing some quantum mechanism into the game theory, quantum game theory provides us with the ability to achieve results not otherwise possible. In this paper, a brief overview of classical game theory and some game-theoretic terms are depicted. Then, an introduction to quantum theory is presented as well as some correlative works in this field. Finally, some well-known quantum games are analyzed and discussed, which shows its predominant effect on some games problems (the Prisoners' Dilemma, Parrondo's Games, etc.). © 2010 IEEE.


Li H.,Institute of Command Automation | Hu G.,Institute of Command Automation | Yang Y.,Institute of Command Automation
Communications in Computer and Information Science | Year: 2012

Botnet sustained a serious threat to Internet security. Especially the emergence of P2P botnets, botnet detection has become a very big challenge. This paper focuses on the P2P botnet traffic characteristics and provides support for P2P botnet detection technology. Through a number of experiments, the paper draws some important conclusions, such as high connection failure rate, high outbound network degree, irregular phased-similarity, etc. These conclusions can help the study of P2P botnets detection. The paper also models P2P botnets and proposes a P2P botnet steady-state model. The model can explain some features of P2P botnets are inevitable and these features can be used for more general detection. © 2012 Springer-Verlag.


Yang Y.,Institute of Command Automation | Hu G.,Institute of Command Automation | Guo S.,Institute of North Electronic Equipment | Yu S.,Institute of North Electronic Equipment
Proceedings - 2010 1st International Conference on Pervasive Computing, Signal Processing and Applications, PCSPA 2010 | Year: 2010

Now botnets have become the great threat of Internet Security. To be well prepared for future attacks, it is not enough to study how to defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be developed in the near future. In this paper, we present the improved design of an advanced hybrid P2P routing algorithm. The first method is based on the distinguish treatment between servent bots and client bots, introduce a connective table into the construction procedure of P2P network, combine with the concept of Maximum Connective Degree(MCD), design a self-adaptive routing algorithm which made the P2P architecture reach a well-balanced connectivity automatically; the second improvement is use dual-channel mechanism to add a special backdoor, which greatly enhanced the robustness of P2P network. © 2010 IEEE.


Qiu H.,Institute of Command Automation | Hu R.,Institute of Command Automation | Shi T.,Shandong University
CSAE 2012 - Proceedings, 2012 IEEE International Conference on Computer Science and Automation Engineering | Year: 2012

Traditional UDDI does not have the capability to process semantic and match to the ser vice attribute, which results in a low recall rate and matching rate. Through the service matching framework of Multi-agent, a Petri net based OWL-S semantic matching mechanism is proposed to de al with the shortcoming, in which PNSDL description language was used to publish and request services. In virtue of the P N's ability for describing we b service, the matching mechanism uses the possibility and necessity to quantify the confidence levels that the service could satisfy a request, so as to finish the matching of service. The matching mechanism has the advantage of powerful ability to process, model for Multiservice, high reality of matching and high matching rate, etc. © 2012 IEEE.


Zhang W.-Z.,Institute of Command Automation | Wang Z.-X.,Institute of Command Automation | Zhu W.-X.,PLA University of Science and Technology | Chen J.,Institute of Command Automation
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology | Year: 2011

To solve the problems of accuracy and integrality of semantic specification for C4ISR modeling, a modeling method of analysis and design of C4ISR based on the system modeling language (SysML) is proposed. Considering the mechanism of SysML, the supporting effect of the new requirement diagrams, parameter diagrams, extended block diagrams and activity diagrams of SysML in modeling C4ISR is researched. The superiority of rigor description and quantitative analysis of SysML for C4ISR modeling is discussed. With an example of aerial defence system, the modeling process based on SysML is researched. The results show that this method is feasible and effective for precise semantic modeling of C4ISR.


He Z.,Institute of Command Automation | Wu L.,Institute of Command Automation | Li H.,Institute of Command Automation | Lai H.,Institute of Command Automation | Hong Z.,Institute of Command Automation
Journal of Computers | Year: 2011

Due to the open and distributed characteristics of eb service, its access control becomes a challenging roblem which has not been addressed properly. In this aper, we show how semantic web technologies can be used o build a flexible access control system for web service. We follow the Role-based Access Control model and extend it with credential attributes. The access control model is represented by a semantic ontology, and specific semantic rules are constructed to implement such as dynamic roles assignment, separation of duty constraints and roles hierarchy reasoning, etc. These semantic rules can be verified and executed automatically by the reasoning engine, which can simplify the definition and enhance the interoperability of the access control policies. The basic access control architecture based on the semantic proposal for web service is presented. Finally, a prototype of the system is implemented to validate the proposal. © 2011 ACADEMY PUBLISHER.


Li Y.,Institute of Communications Engineering | He M.,Institute of command automation | Han Y.,NUDT
International Journal of Digital Content Technology and its Applications | Year: 2011

A game-theoretic framework was used to study the effect of modulation on the energy efficiency of cognitive CDMA (Code Division Multiple Access) communications for adaptive modulation. We designed an adaptive utility function which can link modulation, rate and power control. Since users are selfish and rational, a non-cooperative game was proposed, in which each user chose transmit power, transmit symbol rate as well as the modulation in order to maximize its own utility. Compared with a similar approach, our proposed algorithm can improve performance significantly.


Yang Z.,Institute of Command Automation | Yang Z.,China Institute of Electronic Equipment System Engineering | Yang L.,China Institute of Electronic Equipment System Engineering | Luo X.-Y.,China Institute of Electronic Equipment System Engineering | And 4 more authors.
Journal of Computers (Finland) | Year: 2013

Nowadays the significance of the access control technology in service oriented network is increasingly highlighted. The RBAC access control model has a variety of advantages such as easy management and high efficiency. With the expansion of the network scale, a network must be divided into autonomous multi-domains for convenient management. However, there is still a lack of studies on the domain based RBAC model as the barrier of applying the RBAC to multi-domain environment, and the corresponding supporting implementation technologies for the domain based RBAC are also in weak. In this paper, we proposed a model of domain based RBAC (D-RBAC) to better adapt to the security requirements of the multi-domain environment. We firstly introduced the domain concept and model and then gave a formal description to the proposed D-RBAC model. Secondly, we designed feasible implementation architecture for the D-RBAC model and based on this architecture we proposed two supporting technologies. The fuzzy role mapping method according to user's attributes has strong description abilities for role assignment and the convenience of realization. The dynamic collaboration domain construction framework can greatly improve the efficiency of inter-domain access control. The proposed D-RBAC model and the related supporting technologies can obviously facilitate the application of RBAC in multi-domain environment. © 2013 ACADEMY PUBLISHER.


Wang H.,Institute of Communication Engineering | Song L.,Institute of Command Automation
Advanced Materials Research | Year: 2011

Mobile peer to peer system in Ad hoc network is a brand novel application system. In this paper backgrounds and basic concepts of mobile peer to peer (p2p) systems are introduced firstly. Then possible applications of mobile p2p systems are expounded. Afterwards, technical challenges which mobile p2p system must face are analyzed in detail. In the end, the developments and implementation of mobile p2p system are explored and some conclusions are given. © (2011) Trans Tech Publications Switzerland.


He Z.,Institute of Command Automation | Huang K.,Institute of Command Automation | Wu L.,Institute of Command Automation | Li H.,Institute of Command Automation | Lai H.,Institute of Command Automation
Communications in Computer and Information Science | Year: 2010

Access control is a challenging problem for web service due to its open and distributed nature, which has not been addressed properly at present. In this paper, we show how semantic web technologies can be used to build a flexible access control system for web service. Role-based Access Control model is followed and extended with credentials. The access control model is represented by an OWL-DL ontology, and specific semantic rules are constructed to implement such as dynamic roles assignment, separation of duty constraints and roles hierarchy reasoning, etc. These semantic rules can be verified and executed automatically by the reasoning engine, which can simplify the definition and enhance the interoperability of the access control policies. A prototype implementation is also provided to validate the proposal. © Springer-Verlag 2010.

Loading Institute of Command Automation collaborators
Loading Institute of Command Automation collaborators