期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning 被引量:1
1
作者 Zibo wang Chaobin Huo +5 位作者 Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li bailing wang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2957-2979,共23页
With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas... With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 展开更多
关键词 Path-based reasoning representation learning attention mechanism vulnerability knowledge graph industrial control component
下载PDF
Review on Cyber-physical Systems 被引量:12
2
作者 Yang Liu Yu Peng +2 位作者 bailing wang Sirui Yao Zihe Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第1期27-40,共14页
Cyber-physical systems CPS are complex systems with organic integration and in-depth collaboration of computation, communications and control 3C technology. Subject to the theory and technology of existing network sys... Cyber-physical systems CPS are complex systems with organic integration and in-depth collaboration of computation, communications and control 3C technology. Subject to the theory and technology of existing network systems and physical systems, the development of CPS is facing enormous challenges. This paper first introduces the concept and characteristics of CPS and analyzes the present situation of CPS researches. Then the development of CPS is discussed from perspectives of system model, information processing technology and software design. At last it analyzes the main obstacles and key researches in developing CPS. © 2014 Chinese Association of Automation. 展开更多
关键词 Complex networks Computation theory Data processing Embedded systems Information science
下载PDF
A Novel Collective User Web Behavior Simulation Method 被引量:2
3
作者 Hongri Liu Xu Zhang +1 位作者 Jingjing Li bailing wang 《Computers, Materials & Continua》 SCIE EI 2021年第3期2539-2553,共15页
A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and... A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and prediction,which cannot simulate human dynamics that widely exist in large-scale users’behaviors.To address these issues,we propose a novel collective user web behavior simulation method,in which an algorithm for constructing a connected virtual social network is proposed,and then a collective user web behavior simulation algorithm is designed on the virtual social network.In the simulation method,a new epidemic information dissemination algorithm based on the SIR model is proposed to drive the user web behavior with Breadth—First Search algorithm on the connected virtual social network.We specially build an experiment environment with 12 servers by using Docker container technology and then perform a wide range of experiments with different user scales to evaluate the method.The experimental results demonstrate that not only the degrees of the social network but also the time intervals of the collective users’web behavior can be well fitted to a power-law distribution and show that our simulation method can well simulate a collective user web behavior. 展开更多
关键词 Web behavior simulation virtual social network human dynamics power-law distribution
下载PDF
Iterative Case-Driven Method and Practice of Java Language Teaching
4
作者 Guodong Xin Wei wang +2 位作者 Junheng Huang Yang Liu bailing wang 《计算机教育》 2018年第12期36-40,共5页
This project intends to study and discuss the teaching method of programming languages through an iterative case-driven model, to break through the traditional syntax-based teaching method so that students can activel... This project intends to study and discuss the teaching method of programming languages through an iterative case-driven model, to break through the traditional syntax-based teaching method so that students can actively participate in the case analysis and design which are closely related to enterprise applications. The purpose of teaching is achieved through the gradual iterative case-driven model. This project can form the best practice for the iterative case teaching method and promote programming language course innovation. 展开更多
关键词 PROGRAMMING LANGUAGE TEACHING Java LANGUAGE TEACHING ITERATIVE case-driven TEACHING METHOD
下载PDF
The Interdisciplinary Education for The Emerging Engineering Majors:Taking Cyberspace Security Major as An Example
5
作者 Kaikun Dong Xiaofei Xu +3 位作者 Shisheng Zhong Dianhui Chu Huaqiang Zhang bailing wang 《计算机教育》 2020年第12期20-26,共7页
The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new economy.The in-depth implementation of a series of Chinese important national strategi... The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new economy.The in-depth implementation of a series of Chinese important national strategies such as“Made in China 2025”and“Internet+”is urgently needed the support of innovative and outstanding emerging engineering talents with cross-border integration abilities.Therefore,interdisciplinary education plays an important role in the training of the needed emerging engineering talents.Taking cybersecurity as an example,this paper summarizes the professional’s requirements and proposes the educational objectives of Harbin Institute of Technology.Then the objective oriented curriculum system and the teaching model emphasizing project-based learning are introduced.The practice and effect of interdisciplinary education are discussed and analyzed in four aspects including curriculum system,faculty,students and academy education.Finally,suggestions are made on the individualized education and sustainable competitiveness cultivation of the emerging engineering talents. 展开更多
关键词 emerging engineering education interdisciplinary education cyberspace security project based learning
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部