期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Theoretical Framework for a Polymorphic Network Environment
1
作者 jiangxing wu Junfei Li +2 位作者 Penghao Sun Yuxiang Hu Ziyong Li 《Engineering》 SCIE EI CAS CSCD 2024年第8期222-234,共13页
The question of whether an ideal network exists with global scalability in its full life cycle has always been a first-principles problem in the research of network systems and architectures.Thus far,it has not been p... The question of whether an ideal network exists with global scalability in its full life cycle has always been a first-principles problem in the research of network systems and architectures.Thus far,it has not been possible to scientifically practice the design criteria of an ideal network in a unimorphic network system,making it difficult to adapt to known services with clear application scenarios while supporting the ever-growing future services with unexpected characteristics.Here,we theoretically prove that no unimorphic network system can simultaneously meet the scalability requirement in a full cycle in three dimensions—the service-level agreement(S),multiplexity(M),and variousness(V)—which we name as the“impossible SMV triangle”dilemma.It is only by transforming the current network development paradigm that the contradiction between global scalability and a unified network infrastructure can be resolved from the perspectives of thinking,methodology,and practice norms.In this paper,we propose a theoretical framework called the polymorphic network environment(PNE),the first principle of which is to separate or decouple application network systems from the infrastructure environment and,under the given resource conditions,use core technologies such as the elementization of network baselines,the dynamic aggregation of resources,and collaborative software and hardware arrangements to generate the capability of the“network of networks.”This makes it possible to construct an ideal network system that is designed for change and capable of symbiosis and coexistence with the generative network morpha in the spatiotemporal dimensions.An environment test for principle verification shows that the generated representative application network modalities can not only coexist without mutual influence but also independently match well-defined multimedia services or custom services under the constraints of technical and economic indicators. 展开更多
关键词 Polymorphic network environment Impossible triangle Network development paradigm Future network
下载PDF
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functions 被引量:10
2
作者 Liang Jin Xiaoyan Hu +4 位作者 Yangming Lou Zhou Zhong Xiaoli Sun Huiming Wang jiangxing wu 《China Communications》 SCIE CSCD 2021年第9期88-99,共12页
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm... The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed. 展开更多
关键词 wireless communication endogenous security information security functional safety
下载PDF
An Aware-Scheduling Security Architecture with Priority-Equal Multi-Controller for SDN 被引量:4
3
作者 Chao Qi jiangxing wu +2 位作者 Guozhen Cheng Jianjian Ai Shuo Zhao 《China Communications》 SCIE CSCD 2017年第9期144-154,共11页
Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware deci... Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware decision-making security architecture with multiple controllers, which could coordinate heterogeneous controllers internally as a "big" controller. This architecture includes an additional plane, the scheduling plane, which consists of transponder, sensor, decider and scheduler. Meanwhile it achieves the functions of communicating, supervising and scheduling between data and control plane. In this framework, we adopt the vote results from the majority of controllers to determine valid flow rules distributed to switches. Besides, an aware dynamic scheduling(ADS) mechanism is devised in scheduler to intensify security of Mcad-SA further. Combined with perception, ADS takes advantage of heterogeneity and redundancy of controllers to enable the control plane operate in a dynamic, reliable and unsteady state, which results in significant difficulty of probing systems and executing attacks. Simulation results demonstrate the proposed methods indicate better security resilience over traditional architectures as they have lower failure probability when facing attacks. 展开更多
关键词 MULTI-CONTROLLER security architec-ture aware SCHEDULING
下载PDF
EARS: Intelligence-Driven Experiential Network Architecture for Automatic Routing in Software-Defined Networking 被引量:6
4
作者 Yuxiang Hu Ziyong Li +2 位作者 Julong Lan jiangxing wu Lan Yao 《China Communications》 SCIE CSCD 2020年第2期149-162,共14页
Software-Defined Networking(SDN)adapts logically-centralized control by decoupling control plane from data plane and provides the efficient use of network resources.However,due to the limitation of traditional routing... Software-Defined Networking(SDN)adapts logically-centralized control by decoupling control plane from data plane and provides the efficient use of network resources.However,due to the limitation of traditional routing strategies relying on manual configuration,SDN may suffer from link congestion and inefficient bandwidth allocation among flows,which could degrade network performance significantly.In this paper,we propose EARS,an intelligence-driven experiential network architecture for automatic routing.EARS adapts deep reinforcement learning(DRL)to simulate the human methods of learning experiential knowledge,employs the closed-loop network control mechanism incorporating with network monitoring technologies to realize the interaction with network environment.The proposed EARS can learn to make better control decision from its own experience by interacting with network environment and optimize the network intelligently by adjusting services and resources offered based on network requirements and environmental conditions.Under the network architecture,we design the network utility function with throughput and delay awareness,differentiate flows based on their size characteristics,and design a DDPGbased automatic routing algorithm as DRL decision brain to find the near-optimal paths for mice and elephant flows.To validate the network architecture,we implement it on a real network environment.Extensive simulation results show that EARS significantly improve the network throughput and reduces the average packet delay in comparison with baseline schemes(e.g.OSPF,ECMP). 展开更多
关键词 software-defined networking(SDN) intelligence-driven experiential network deep reinforcement learning(DRL) automatic routing
下载PDF
Cyberspace Endogenous Safety and Security 被引量:3
5
作者 jiangxing wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
MimicCloudSim:An Environment for Modeling and Simulation of Mimic Cloud Service 被引量:2
6
作者 Liming Pu jiangxing wu +2 位作者 Hailong Ma Yuhang Zhu Yingle Li 《China Communications》 SCIE CSCD 2021年第1期212-221,共10页
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha... In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable. 展开更多
关键词 cyber mimic defense mimic cloud service SIMULATION dynamic heterogeneous redundancy
下载PDF
Anti-Attacking Modeling and Analysis of Cyberspace Mimic DNS 被引量:1
7
作者 Lei He Quan Ren +2 位作者 Bolin Ma Weili Zhang jiangxing wu 《China Communications》 SCIE CSCD 2022年第5期218-230,共13页
With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper ... With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy. 展开更多
关键词 cyberspace mimic DNS generalized stochastic Petri net anti-attacking MODELING performance
下载PDF
Solve the False-Positive Problem of the Mimic System Based on the Best Mimic Component Set 被引量:1
8
作者 Yuwen Shao Zheng Zhang +2 位作者 Xiaomei Wang Chuanxing Pan jiangxing wu 《China Communications》 SCIE CSCD 2022年第5期253-266,共14页
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation technology.Previous studies have focused on the“compensation”method to deal with this problem,which is expe... At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation technology.Previous studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot fundamentally solve it.This paper provides new insights into coping with the situation.Firstly,this study summarizes the false-positive problem in the mimic transformation,analyzes its possible harm and the root causes.Secondly,three properties about the mimic scope are proposed.Based on the three properties and security quantification technology,the best mimic component set theory is put forward to solve the false-positive problem.There are two algorithms,the supplemental method and the subtraction method.The best mimic component set obtained by these two algorithms can fundamentally solve the mimic system’s false-positive problem but reduce the cost of mimic transformation.Thus make up for the lack of previous researches. 展开更多
关键词 mimic scope the best mimic component set false-positive rate mimic transformation
下载PDF
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
9
作者 Bingzheng Li Zheng Zhang +2 位作者 Xiaomei Wang Sheng Qu jiangxing wu 《China Communications》 SCIE CSCD 2021年第8期85-95,共11页
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend ag... As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information.However,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel.First,we analyze the security of MVX theory from the perspective of formal description.Then we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation technologies.We propose SecMVX,a secure MVX architecture and variant generation technology.Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX. 展开更多
关键词 multi-variant execution software diversity cyberspace security
下载PDF
从SoC到SDSoW:微电子发展的新范式
10
作者 邬江兴 刘勤让 +23 位作者 沈剑良 吕平 宋克 张帆 李沛杰 陈艇 刘冬培 张汝云 李顺斌 高彦钊 魏帅 张文建 赵博 郭威 虎艳宾 祁晓峰 董春雷 于洪 张丽 张霞 裴雪 赵豪兵 李智超 刘文斌 《中国科学:信息科学》 CSCD 北大核心 2024年第6期1350-1368,共19页
微电子在智能时代正迎来新一轮技术与产业的重大变革期.本文从智能时代的科学方法论、系统集成的工程技术路线和微电子摩尔定律(Moore’s law)的维度扩展3个层面导入,提出了网络极大化节点极小化的复杂巨系统构造、异构异质芯粒的晶上... 微电子在智能时代正迎来新一轮技术与产业的重大变革期.本文从智能时代的科学方法论、系统集成的工程技术路线和微电子摩尔定律(Moore’s law)的维度扩展3个层面导入,提出了网络极大化节点极小化的复杂巨系统构造、异构异质芯粒的晶上拼装集成、硬件资源的领域专用软硬件协同定义,形成了软件定义晶上系统的新发展范式,对微电子的设计方法、系统集成、应用开发、经济性指标等进行了内涵升级,可全面刷新信息基础设施的技术物理形态,贡献一条“晶圆级硅基直连”的系统集成工程技术路线,并有望打造出智能涌现的物理底座. 展开更多
关键词 片上系统 软件定义互连 软件定义晶上系统 异质异构 热压键合 软硬件协同
原文传递
通用分组网络寻址路由与标识演进方法及系统
11
作者 李挥 邬江兴 +18 位作者 韦国华 孟详帧 白鹤 林立宏 杨昕 伊鹏 宗泽斌 魏进武 朱伏生 陆以勤 缪伟豪 杨伟豪 郑泽峰 马军锋 张明龙 张汉裕 褚晓理 何品翰 王泽华 《中国科学:信息科学》 CSCD 北大核心 2023年第8期1629-1644,共16页
未来的网络通信需求动态多样,网络层功能也应适时而变,因此对网络可演进性的研究具有重要意义.多标识网络作为一种兼容性极强的网络架构,网络层功能十分丰富,但仍缺少网络演进性设计.本文为多标识网络设计了一种通过标识扩展来支持网络... 未来的网络通信需求动态多样,网络层功能也应适时而变,因此对网络可演进性的研究具有重要意义.多标识网络作为一种兼容性极强的网络架构,网络层功能十分丰富,但仍缺少网络演进性设计.本文为多标识网络设计了一种通过标识扩展来支持网络体系不断演进的方案,包括对标识空间进行形式化定义,设计标识回退候选标识的优先级排序算法以及设计支持标识扩展的路由转发协议;并且在ndnSIM网络仿真环境和多标识网络测试床中实现了上述方案,评估了标识扩展方案的可行性和性能.实验结果表明相比于标识扩展机制给网络架构带来的益处,其性能损失在可接受的范围内. 展开更多
关键词 多标识网络 标识扩展 网络演进 原型系统 ndnSIM仿真
原文传递
多边共管的多模态网络标识域名生成管理解析原型系统 被引量:9
12
作者 李挥 邬江兴 +34 位作者 邢凯轩 伊鹏 陈世胜 梁伟 魏进武 李卫 朱伏生 田开颜 朱江 陆以勤 徐恪 宋佳兴 刘怡俊 董永吉 韩永祥 侯韩旭 马军锋 徐睿 阙建明 杨伟豪 缪伟豪 郑泽峰 孙涛 韦国华 綦九华 刘吉 白永杰 宁崇辉 王菡 张昕淳 胡嘉伟 黄健森 吕赛 刘馨蔚 李更新 《中国科学:信息科学》 CSCD 北大核心 2019年第9期1186-1204,共19页
面对新形势下互联网蓬勃发展给现有网络体系带来的挑战,现有单边主义下的域名管理系统(DNS)在专业化服务质量和安全管控方面已力不从心.本文从分析现有网络体系问题出发,结合世界网络发展趋势,明确新型网络基本技术特征,以高安全、高鲁... 面对新形势下互联网蓬勃发展给现有网络体系带来的挑战,现有单边主义下的域名管理系统(DNS)在专业化服务质量和安全管控方面已力不从心.本文从分析现有网络体系问题出发,结合世界网络发展趋势,明确新型网络基本技术特征,以高安全、高鲁棒、高效能和高可用性为导向,提出新型多模态域名管理技术框架,实现融合多边共管的投票管理和多模态网络下标识域名互访和互隧道功能的原型系统.原型系统通过现网测试验证了理论的正确性和可行性.该系统可以方便地应用于自主多模态标识空间下的主权网及高安全专网,为全世界对网络共管共治的诉求提供了中国方案. 展开更多
关键词 多边共管 域名解析 多模态网络 联盟链共识PoV 多模标识互相隧道/互译 后IP高安全专网
原文传递
计算体系架构研究综述与思考 被引量:3
13
作者 高彦钊 邬江兴 +3 位作者 刘勤让 沈剑良 宋克 张帆 《中国科学:信息科学》 CSCD 北大核心 2022年第3期377-398,共22页
随着摩尔定律(Moore's law)与迪纳德(Dennard)缩放定律逐步走向终结,依靠集成电路制程工艺的进步提升计算系统性能与效能越来越困难,计算体系架构的演进成为了未来计算系统发展的重要技术途径.本文首先从应用适应性、计算驱动方式... 随着摩尔定律(Moore's law)与迪纳德(Dennard)缩放定律逐步走向终结,依靠集成电路制程工艺的进步提升计算系统性能与效能越来越困难,计算体系架构的演进成为了未来计算系统发展的重要技术途径.本文首先从应用适应性、计算驱动方式、系统重心变化、计算核心构成,以及计算逻辑使用等不同的角度回顾了体系架构的发展历程,总结了不同体系架构的优缺点;然后着重分析了在人工智能、大数据等应用飞速发展的条件下未来计算系统的能力需求特征;最后提出了软件定义计算体系架构,并梳理了其重点研究内容与关键技术,为未来计算体系架构的发展提供了一条可行的技术途径. 展开更多
关键词 体系架构 软件定义计算 领域专用架构 异构计算 可重构计算
原文传递
融合广义随机Petri网的二维拟态安全评估模型 被引量:4
14
作者 杨昕 李挥 +1 位作者 邬江兴 伊鹏 《中国科学:信息科学》 CSCD 北大核心 2020年第12期1944-1960,共17页
―为应对网络空间中的未知安全漏洞,拟态防御系统作为一种动态异构冗余的新型防御架构破茧而出.拟态系统根据网络环境自发进行重配置,扭转了传统静态网络攻防不对等的局面.然而目前仍缺乏有说服力的能够定量评估并比较不同的安全防御系... ―为应对网络空间中的未知安全漏洞,拟态防御系统作为一种动态异构冗余的新型防御架构破茧而出.拟态系统根据网络环境自发进行重配置,扭转了传统静态网络攻防不对等的局面.然而目前仍缺乏有说服力的能够定量评估并比较不同的安全防御系统有效性的实用方案.本文深入研究拟态架构,提出了一种二维分析模型,该模型将系统配置细节计算为量化结果,以比较不同动态网络的可靠性,且该模型在不同网络配置间可保持良好的可扩展性.具体来说,在分析的第1维度即单节点攻击分析时,我们详细介绍了系统配置,使用广义随机Petri网模型对攻击者和防御者的行为分别进行描述建模,刻画其对系统状态的影响.结合泊松过程、常见漏洞和暴露以及常见漏洞评分系统,我们对其影响设计函数进行赋值、量化计算.在分析的第2个维度即链路攻击中,我们采用马尔可夫(Markov)链,并用鞅理论进行计算,量化表达了攻击难度即攻击得手时长和网络配置之间的关系.最后,给出日常防御下和攻击情景下的安全度量方案,验证了拟态防御的有效性,为拟态系统的设计提供了理论指导. 展开更多
关键词 ―拟态网络防御 广义随机 PETRI网络 通用漏洞评分系统 安全分析 安全模型
原文传递
Dynamic changes in soil chemical properties and microbial community structure in response to different nitrogen fertilizers in an acidified celery soil 被引量:9
15
作者 Yuping wu jiangxing wu +6 位作者 Yongjun Ma Ying Lian Hui Sun Danchao Xie Yaying Li Philip C.Brookes Huaiying Yao 《Soil Ecology Letters》 CAS 2019年第3期105-113,共9页
To determine the effects of different kinds of nitrogen fertilizer,especially high-efficiency slowrelease fertilizers,on soil pH,nitrogen(N)and microbial community structures in an acidic celery soil,four treatments(C... To determine the effects of different kinds of nitrogen fertilizer,especially high-efficiency slowrelease fertilizers,on soil pH,nitrogen(N)and microbial community structures in an acidic celery soil,four treatments(CK,no N fertilizer;NR,urea;PE,calcium cyanamide fertilizer;and SK,controlled-release N fertilizer)were applied,and soil pH,total soil N,inorganic N,and soil microbial biomass C were analyzed.Phospholipid fatty acids(PLFAs)were extracted and detected using the MIDI Sherlock microbial identification system.The PE treatment significantly improved soil pH,from 4.80 to>6.00,during the whole growth period of the celery,and resulted in the highest celery yield among the four treatments.After 14 d application of calcium cyanamide,the soil nitrate content significantly decreased,but the ammonium content significantly increased.The PE treatment also significantly increased soil microbial biomass C during the whole celery growth period.Canonical variate analysis of the PLFA data indicated that the soil microbial community structure in the CK treatment was significantly different from those in the N applied treatments after 49 d fertilization.However,there was a significant difference(P<0.05)in soil microbial community structure between the PE treatment and the other three treatments at the end of the experiment.Calcium cyanamide is a good choice for farmers to use on acidic celery land because it supplies sufficient N,and increases soil pH,microbial biomass and the yield of celery. 展开更多
关键词 Acidified Calcium cyanamide CELERY Phospholipid fatty acid Soil nitrogen
原文传递
Discussion on a new paradigm of endogenous security towards 6G networks 被引量:3
16
作者 Xinsheng JI jiangxing wu +6 位作者 Liang JIN Kaizhi HUANG Yajun CHEN Xiaoli SUN Wei YOU Shumin HUO Jing YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第10期1421-1450,共30页
The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with the&#... The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with theªunknown unknownºsecurity threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security.Then,it analyzes the security problems faced by the 6G core network,wireless access network,and emerging associated technologies in detail,as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security.Furthermore,this paper describes the relevant security theories and technical concepts under the guidance of the new paradigm of endogenous security. 展开更多
关键词 6G security New paradigm of endogenous security Core network Wireless access network
原文传递
Problems and solutions regarding generalized functional safety in cyberspace 被引量:5
17
作者 jiangxing wu 《Security and Safety》 2022年第1期90-102,共13页
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical s... The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace. 展开更多
关键词 Common endogenous security problem Generalized functional safety(S&S) Dynamic heterogeneity redundancy(DHR)architecture General robust control mechanism Coding channel theory Common cross-disciplinary eld problems
原文传递
On integrated security and safety
18
作者 jiangxing wu 《Security and Safety》 2022年第1期1-1,共1页
With the ubiquitous application of digital,intelligent,and network technologies,the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with func­tional ... With the ubiquitous application of digital,intelligent,and network technologies,the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with func­tional or system failures caused by random ineffectiveness in the mechanical and electric age.In order to guarantee the functional safety for cyber physical systems(CPS)in cyberspace in the information age,it is impossible to avoid challenges of cyber security,especially"unknown unknown"network threats and attack events aimed at CPS systems,software/hardwrare facility vulnerabilities or loopholes and backdoors.Such challenges have a terrible ghost-haunted nature and attributes that cannot be expressed through mathematical models.They have gone beyond the random hypothetical premises of classical functional safety theories and mathematical nature to be expressed through probability,as well as shaken the foundations of conventional reliability theories,technological methodologies,and practice norms. 展开更多
关键词 GHOST NETWORK GUARANTEE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部