2019
DOI: 10.1109/access.2019.2943493
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Tracking Watermarking Scheme

Abstract: With the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rapidly evolving anonymous communication systems provide convenience for attackers to hide real IP. In addition, the attacker forms a ''stepping'' chain by breaking through several intermediate systems of the edge computing network. Thereby implementing an invisible i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
3
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Besides, we can see the number of test cases generated by AFL-fuzzer grows steadily as the number of samples increases, because Afl-fuzzer prunes input samples in consideration of that users may offer low-quality initial samples and thus cause the possible data redundancy in some types of variations. Although depending more on the number of samples, the method proposed adopts a more pertinent generation strategy [35][36][37][38][39][40][41][42][43][44][45][46][47][48][49]. Figure 11 shows the coverage rate of code.…”
Section: Methods and Experimentalmentioning
confidence: 99%
“…Besides, we can see the number of test cases generated by AFL-fuzzer grows steadily as the number of samples increases, because Afl-fuzzer prunes input samples in consideration of that users may offer low-quality initial samples and thus cause the possible data redundancy in some types of variations. Although depending more on the number of samples, the method proposed adopts a more pertinent generation strategy [35][36][37][38][39][40][41][42][43][44][45][46][47][48][49]. Figure 11 shows the coverage rate of code.…”
Section: Methods and Experimentalmentioning
confidence: 99%
“…Besides, we can see the number of test cases generated by AFL-fuzzer grows steadily as the number of samples increases, because Afl-fuzzer prunes input samples in consideration of that users may offer low-quality initial samples and thus cause the possible data redundancy in some types of variations. Although depending more on the number of samples, the method proposed adopts a more pertinent generation strategy [35][36][37][38][39][40][41][42][43][44][45].…”
Section: Methods and Experimentalmentioning
confidence: 99%
“…(2) The user certificate and attributes are not obvious [18,19]. (3) Defects in multi-machine deployment [20][21][22]. This paper uses CouchDB as the user StateStore.…”
Section: User State Storementioning
confidence: 99%