This paper addresses capacity estimation for cellular code-division multiple-access (CDMA) systems, assuming the IS-95 standard as a reference, Extending the analytical method from [6], we obtain a sequence of bounds on capacity, and then we introduce an accurate approximation to reduce computation complexity. The analysis accounts for interference internal and external to the reference cell, fading, shadowing, and imperfect power control. Outage probability is expressed in terms of the characteristic functions (cf's) of the interference and imperfect power control random variables (rv's), The interference contributions are computed on the basis of a Poisson distribution for the number of users in a lognormally shadowed channel. Results are provided for different channel conditions and are validated against Monte Carlo simulations, A comparison against previously published CDMA capacity estimates is carried out, aimed at clarifying some controversial issues. It is also confirmed that large system capacity is achievable under tight power control
Abstract. The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. We are now dealing with exploit kits. In this paper we focus on the server-side part of drive-by downloads by automatically analyzing the source code of multiple exploit kits. We discover through static analysis what checks exploit-kit authors perform on the server to decide which exploit is served to which client and we automatically generate the configurations to extract all possible exploits from every exploit kit. We also examine the source code of exploit kits and look for interesting coding practices, their detection mitigation techniques, the similarities between them and the rise of Exploit-as-a-Service through a highly customizable design. Our results indicate that even with a perfect drive-by download analyzer it is not trivial to trigger the expected behavior from an exploit kit so that it is classified appropriately as malicious.
SUMMARYThe Rice-lognormal (RLN) channel model was recently generalized to include an additive scattering component having constant average power. The generalized Rice-lognormal (GRLN) model includes as limiting cases many well-known narrowband models such as, e.g. Rice, lognormal (and combinations), and Loo's. The paper provides the GRLN "rst-order statistical description of envelope and phase, and the second-order statistics in terms of level crossing rate. The paper then provides a "tting procedure to extract model parameters from experimental data. Finally, it presents a new simulation procedure and validates it through comparison with theoretical results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.