(Changchun University of Science and Technology,Changchun 130000)
Abstract: Network is one of the 20th century after the invention of the contribution of the greatest human society, most far-reaching. The impact of social networks on the transmission of information beyond the means of any past era, this article from the perspective of network attack and defense, protocol and security solutions to elaborate network protocol security. Focus on vulnerabilities and prevention strategies in the physical network layer of wireless networks, and the real experiment.
Keywords: network; communications protocol ;security vulnerability; prevention strategies
References
[1] Zhou DL; Pan Q; Zhang HC: An improved algorithm of edge detection based on fuzzy sets[C].Image Graph,2001,6(4):353-358.
[2] S. Borromeo, J.L. Aparicio, P.M. Martínez,"MEDES: Automatic system for wear measurement of overhead wires" WCRR'01, November 2001.
[3] Br1nk A D. Threshold of digital images using two dimensional entropies[J].Pattern Recognition.1992,25(8):803-808
[4] Cornelius T. Leondes(ed),Image processing and pattern recognition,Calif. Academic press, San Diego,1998
[5] J.M. Van Gigch, C. Smorenburg, A.W. Benschop, "Le système de mesure de l'epaisseur des fils de contact des Chemins de fer néerlandais (NS)". Rail International, Avril 1991, pp 20-31
[6] T. Riesgo, Y. Torroja, E. De la Torre, "Design methodologies based on hardware description languages", IEEE Transactions on Industrial Electronics, vol. 46, no. 1, pp. 3-12, Feb. 2006.
[7] R. Müller, "Contact wire wear measurement devices. A system comparation" WCRR'97, November 2004.
[8] A. Fumi, A. Forgione, "A new complete system for catenary's checking. WCRR'01, November 2009.
[9] H. Mathieu, J.M. Dadonneau, and G. Rouan, "Automatissation de la mesure de l'épaisseur du fil de contact des caténaires" Reveu Généale des Chemis de Fer, May 2007, pp. 284-288
作者簡介:
馮揚,男,就讀于長春理工大學,現為計算機學院碩士研究生。研究專業方向為網絡協議安全攻防與預防策略。