期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Isolated Pancreatic Tuberculosis in Non-immunocompromised Patient Treated by Whipple's Procedure:a Case Report 被引量:2
1
作者 Shao-long Sun Feng Gao +1 位作者 Dong-xu Cui bao-sheng wang 《Chinese Medical Sciences Journal》 CAS CSCD 2014年第1期58-60,共3页
PANCREATIC tuberculosis(TB)is a rare disease and its diagnosis is difficult because of the lack of specific clinical manifestations.Computed tomography(CT)and magnetic resonance imaging(MRI)have some diagnostic values... PANCREATIC tuberculosis(TB)is a rare disease and its diagnosis is difficult because of the lack of specific clinical manifestations.Computed tomography(CT)and magnetic resonance imaging(MRI)have some diagnostic values in this disease,but it is easy to misdiagnose pancreatic TB as a pancreatic tumor.1 In this article,we present a case of non-immunocompromised patient developing an isolated pancreatic TB,report the CT and MRI findings,and the surgical procedure for it. 展开更多
关键词 pancreatic tuberculosis Whipple's procedure computed tomography
下载PDF
Game theoretic analysis for the mechanism of moving target defense 被引量:5
2
作者 Gui-lin CAI bao-sheng wang Qian-qian XING 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期2017-2034,共18页
Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of... Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of the MTD technology is still absent. In this paper, we analyze the defense mechanism of MTD technology in two dimensions. First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technology intuitively. Second, we use the incomplete information dynamic game theory to verify the proactivity and effect of MTD technology. Specifically, we model the interaction between a defender who equips a server with different types of MTD techniques and a visitor who can be a user or an attacker, and analyze the equilibria and their conditions for these models. Then, we take an existing incomplete information dynamic game model for traditional defense and its equilibrium result as baseline for comparison, to validate the proactivity and effect of MTD technology. We also identify the factors that will influence the proactivity and effectiveness of the MTD approaches. This work gives theoretical support for understanding the defense process and defense mechanism of MTD technology and provides suggestions to improve the effectiveness of MTD approaches. 展开更多
关键词 Network security Moving target defense (MTD) Defense mechanism Defense model Game theory
原文传递
Automatic malware classification and new malware detection using machine learning 被引量:10
3
作者 Liu LIU bao-sheng wang +1 位作者 Bo YU Qiu-xi ZHONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1336-1347,共12页
The explosive growth ofmalware variants poses a major threat to information security. Traditional anti-virus systems based on signatures fail to classify unknown malware into their corresponding families and to detect... The explosive growth ofmalware variants poses a major threat to information security. Traditional anti-virus systems based on signatures fail to classify unknown malware into their corresponding families and to detect new kinds of malware pro- grams. Therefore, we propose a machine learning based malware analysis system, which is composed of three modules: data processing, decision making, and new malware detection. The data processing module deals with gray-scale images, Opcode n-gram, and import fimctions, which are employed to extract the features of the malware. The decision-making module uses the features to classify the malware and to identify suspicious malware. Finally, the detection module uses the shared nearest neighbor (SNN) clustering algorithm to discover new malware families. Our approach is evaluated on more than 20 000 malware instances, which were collected by Kingsoft, ESET NOD32, and Anubis. The results show that our system can effectively classify the un- known malware with a best accuracy of 98.9%, and successfully detects 86.7% of the new malware. 展开更多
关键词 Malware classification Machine learning N-GRAM Gray-scale image Feature extraction Malware detection
原文传递
Moving target defense:state of the art and characteristics 被引量:3
4
作者 Gui-lin CAI bao-sheng wang +1 位作者 Wei HU Tian-zuo wang 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第11期1122-1153,共32页
Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have b... Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have been published. However, comprehensive analyses and research on MTD are still absent. In this paper, we present a survey on MTD technologies to scientifically and systematically introduce, categorize, and summarize the existing research works in this field. First, a new security model is introduced to describe the changes in the traditional defense paradigm and security model caused by the introduction of MTD. A function-and-movement model is provided to give a panoramic overview on different perspectives for understanding the existing MTD research works. Then a systematic interpretation of published literature is presented to describe the state of the art of the three main areas in the MTD field, namely, MTD theory, MTD strategy, and MTD evaluation. Specifically,in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated. Thereafter, the methods to implement these characteristics are concluded. Moreover, the MTD strategies are classified into three types according to their specific goals, and the necessary and sufficient conditions of each type to create effective MTD strategies are then summarized, which are typically one or more of the aforementioned characteristics. Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers. 展开更多
关键词 Moving target defense Security model Function-and-movement model CHARACTERISTICS
原文传递
A keyed-hashing based self-synchronization mechanism for port address hopping communication 被引量:2
5
作者 Yue-bin LUO bao-sheng wang +1 位作者 Xiao-feng wang Bo-feng ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第5期719-728,共10页
Port address hopping(PAH) communication is a powerful network moving target defense(MTD)mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is ... Port address hopping(PAH) communication is a powerful network moving target defense(MTD)mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is synchronization. Existing schemes usually provide hops for each session lasting only a few seconds/minutes, making them easily influenced by network events such as transmission delays, traffic jams, packet dropouts, reordering, and retransmission. To address these problems, in this paper we propose a novel selfsynchronization scheme, called ‘keyed-hashing based self-synchronization(KHSS)'. The proposed method generates the message authentication code(MAC) based on the hash based MAC(HMAC), which is then further used as the synchronization information for port address encoding and decoding. Providing the PAH communication system with one-packet-one-hopping and invisible message authentication abilities enables both clients and servers to constantly change their identities as well as perform message authentication over unreliable communication mediums without synchronization and authentication information transmissions. Theoretical analysis and simulation and experiment results show that the proposed method is effective in defending against man-in-the-middle(MITM) attacks and network scanning. It significantly outperforms existing schemes in terms of both security and hopping efficiency. 展开更多
关键词 Synchronization Port address hopping Moving target defense Network security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部