期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Isolated Pancreatic Tuberculosis in Non-immunocompromised Patient Treated by Whipple's Procedure:a Case Report 被引量:2
1
作者 Shao-long Sun Feng Gao +1 位作者 Dong-xu Cui bao-sheng wang 《Chinese Medical Sciences Journal》 CAS CSCD 2014年第1期58-60,共3页
PANCREATIC tuberculosis(TB)is a rare disease and its diagnosis is difficult because of the lack of specific clinical manifestations.Computed tomography(CT)and magnetic resonance imaging(MRI)have some diagnostic values... PANCREATIC tuberculosis(TB)is a rare disease and its diagnosis is difficult because of the lack of specific clinical manifestations.Computed tomography(CT)and magnetic resonance imaging(MRI)have some diagnostic values in this disease,but it is easy to misdiagnose pancreatic TB as a pancreatic tumor.1 In this article,we present a case of non-immunocompromised patient developing an isolated pancreatic TB,report the CT and MRI findings,and the surgical procedure for it. 展开更多
关键词 免疫功能低下 胰腺肿瘤 结核 病例报告 程序处理 孤立 计算机断层扫描 惠普
下载PDF
Game theoretic analysis for the mechanism of moving target defense 被引量:5
2
作者 Gui-lin CAI bao-sheng wang Qian-qian XING 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期2017-2034,共18页
移动目标防御(moving target defense,MTD)为改变当前网络易攻难守的局面提供了一种新的思路。目前已有大量的MTD技术,但对其防御机理的研究仍然缺乏。本文从两个角度对MTD技术的防御机理进行分析。首先,提出一种新的防御模型MP2R,从直... 移动目标防御(moving target defense,MTD)为改变当前网络易攻难守的局面提供了一种新的思路。目前已有大量的MTD技术,但对其防御机理的研究仍然缺乏。本文从两个角度对MTD技术的防御机理进行分析。首先,提出一种新的防御模型MP2R,从直观上描述MTD的主动性和有效性。然后,采用不完全信息动态博弈理论阐述和研究MTD技术的主动性和有效性。对可为服务器配备不同类型MTD技术的防御者与访问者(攻击者或正常用户)之间的行为交互进行建模,并求解出该模型的均衡结果及均衡条件。同时,将针对传统防御不完全信息动态博弈的已有模型作比较,说明MTD技术的主动性和有效性。此外,本文还分析了影响MTD方法主动性和有效性的因素。本文为理解MTD防御机理提供理论依据,并为改善MTD方法的有效性提供指导。 展开更多
关键词 网络安全 移动目标防御 防御机理 防御模型 博弈论
原文传递
Automatic malware classification and new malware detection using machine learning 被引量:10
3
作者 Liu LIU bao-sheng wang +1 位作者 Bo YU Qiu-xi ZHONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1336-1347,共12页
恶意软件的爆炸式增长对信息安全构成重大威胁。基于签名机制的传统反病毒系统无法将未知的恶意软件分类到相应的恶意家族和检测新的恶意软件。因此,我们提出一种基于机器学习的恶意软件分析系统,由数据处理系统,决策系统和新的恶意软... 恶意软件的爆炸式增长对信息安全构成重大威胁。基于签名机制的传统反病毒系统无法将未知的恶意软件分类到相应的恶意家族和检测新的恶意软件。因此,我们提出一种基于机器学习的恶意软件分析系统,由数据处理系统,决策系统和新的恶意软件检测系统三个子系统组成。数据处理系统包含灰度图像的纹理特征,Opcode特征和API特征等三种特征提取方法。决策系统被用来分类恶意软件和证实可疑的恶意软件。最后,检测系统使用共享近邻聚类算法(shared nearest neighbor,SNN)来发现新的恶意软件。我们在Kingsoft,,ESET NOD32和Anubis收集的二万多恶意样本集上对所提出的方法进行了评估。结果表明,我们的系统可以有效地分类未知恶意软件,准确率可达98.9%。同时新恶意软件的成功检测率为86.7%。 展开更多
关键词 恶意代码分类 机器学习 N-GRAM 灰度图 特征提取 恶意代码检测
原文传递
Moving target defense:state of the art and characteristics 被引量:3
4
作者 Gui-lin CAI bao-sheng wang +1 位作者 Wei HU Tian-zuo wang 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第11期1122-1153,共32页
Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have b... Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have been published. However, comprehensive analyses and research on MTD are still absent. In this paper, we present a survey on MTD technologies to scientifically and systematically introduce, categorize, and summarize the existing research works in this field. First, a new security model is introduced to describe the changes in the traditional defense paradigm and security model caused by the introduction of MTD. A function-and-movement model is provided to give a panoramic overview on different perspectives for understanding the existing MTD research works. Then a systematic interpretation of published literature is presented to describe the state of the art of the three main areas in the MTD field, namely, MTD theory, MTD strategy, and MTD evaluation. Specifically,in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated. Thereafter, the methods to implement these characteristics are concluded. Moreover, the MTD strategies are classified into three types according to their specific goals, and the necessary and sufficient conditions of each type to create effective MTD strategies are then summarized, which are typically one or more of the aforementioned characteristics. Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers. 展开更多
关键词 动人的目标防卫 安全模型 Function-and-movement 模型 特征 TP393
原文传递
A keyed-hashing based self-synchronization mechanism for port address hopping communication 被引量:2
5
作者 Yue-bin LUO bao-sheng wang +1 位作者 Xiao-feng wang Bo-feng ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第5期719-728,共10页
Port address hopping(PAH) communication is a powerful network moving target defense(MTD)mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is ... Port address hopping(PAH) communication is a powerful network moving target defense(MTD)mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is synchronization. Existing schemes usually provide hops for each session lasting only a few seconds/minutes, making them easily influenced by network events such as transmission delays, traffic jams, packet dropouts, reordering, and retransmission. To address these problems, in this paper we propose a novel selfsynchronization scheme, called ‘keyed-hashing based self-synchronization(KHSS)'. The proposed method generates the message authentication code(MAC) based on the hash based MAC(HMAC), which is then further used as the synchronization information for port address encoding and decoding. Providing the PAH communication system with one-packet-one-hopping and invisible message authentication abilities enables both clients and servers to constantly change their identities as well as perform message authentication over unreliable communication mediums without synchronization and authentication information transmissions. Theoretical analysis and simulation and experiment results show that the proposed method is effective in defending against man-in-the-middle(MITM) attacks and network scanning. It significantly outperforms existing schemes in terms of both security and hopping efficiency. 展开更多
关键词 Synchronization Port address hopping Moving target defense Network security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部