期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
1
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
2
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
下载PDF
A review of the application of computer vision technology in aquaculture 被引量:5
3
作者 CUl Zhen WU Jun-feng +3 位作者 YU Hong DONG Wan-ting LU Xiao-li CHENG Ming 《Marine Science Bulletin》 CAS 2018年第1期53-66,共14页
In recent years, aquaculture industry in China is developing rapidly, and especially, China has the largest aquaculture area and the most output in the world. In the past, traditional aquaculture mainly depended on ma... In recent years, aquaculture industry in China is developing rapidly, and especially, China has the largest aquaculture area and the most output in the world. In the past, traditional aquaculture mainly depended on manual labour to breed and gain aquatic organisms. However, with the increasing scale of production and the continuous improvement of science and technology, the traditional aquaculture approach has become more and more unsuitable for the development of the times. With the rapid development of computer technology, computer vision technology infiltrates through the traditional aquaculture industry quickly and improves the aquaculture production efficiency .This paper mainly introduces the basic situation of computer vision technology and summarizes the application of computer vision technology in aquaculture industry at home and abroad. The paper concludes with the expectation of application of computer vision in the aquaculture. 展开更多
关键词 computer vision AQUACULTURE biological identification behavior monitoring
下载PDF
A model of unsafe behavior in coal mines based on game theory 被引量:5
4
作者 Li Shuang Wang Yao Liu Qian 《International Journal of Mining Science and Technology》 SCIE EI 2013年第1期99-103,共5页
Behavior choice, coal mine monitoring, and control intensity are combined in a general mathematical model established from the perspective of a behavioral game. A case study is provided with effective conditions of mo... Behavior choice, coal mine monitoring, and control intensity are combined in a general mathematical model established from the perspective of a behavioral game. A case study is provided with effective conditions of monitoring provided. This paper defines the expected value difference of control return and behavior cost difference and discusses the measurement and optimization of variable indexes, including the monitoring intensity and costs of control. The results imply that the control of unsafe behavior can be more effective when monitoring and control of coal mines are both improved. Monitoring will be useful when the rewards for displaying safe behavior, and the monitoring of unsafe behavior, are improved to a high level. 展开更多
关键词 Coal mine Unsafe behavior monitoring Intensity
下载PDF
AndroidCare: A Simple and Low Cost Assisted Living Solution
5
作者 Abraham Otero Alejandro Escario +4 位作者 David G. Márquez Gabriel Caffarena Rodrigo García-Carmona Ana Iriarte Rafael Raya 《Journal of Biomedical Science and Engineering》 2016年第10期20-28,共9页
Population aging places a growing stress on society’s resources. There is a need for Assisted Living (AL) technologies that allow the elderly to live independently as long as possible. The AndroidCare open source pro... Population aging places a growing stress on society’s resources. There is a need for Assisted Living (AL) technologies that allow the elderly to live independently as long as possible. The AndroidCare open source project aims to explore what functionality can be provided in a low cost AL solution where no professional health organization is involved in the deployment or maintenance of the solution, nor in supervising the pa-tient;all these tasks are carried out by a relative of the elder. Therefore, in the system’s design simplicity of use has prevailed over having a lot of features. It is based on stan-dard off-the-shell commodity hardware (a smartphone) and it provides 1) assistance to the elder in complying with the treatment of chronic diseases;2) monitors and alerts of the occurrence of risk situations such as falls;and 3) simplifies the supervision of the elder’s therapy and behavior by the caregiver. 展开更多
关键词 Assisted Living AGING Chronic Diseases Behavior monitoring
下载PDF
Research on Driver Monitoring Systems Based on Vital Signs and Behavior Detection
6
作者 Man Niu Yanqing Wang +1 位作者 Xinya Shu Xiaofeng Gao 《国际计算机前沿大会会议论文集》 EI 2023年第2期139-152,共14页
Aiming at drivers’dangerous driving behavior monitoring and health monitoring,this paper designs an intelligent steering wheel that can monitor dan-gerous driving behavior and a steering wheel sleeve that can monitor... Aiming at drivers’dangerous driving behavior monitoring and health monitoring,this paper designs an intelligent steering wheel that can monitor dan-gerous driving behavior and a steering wheel sleeve that can monitor physical health.The MTCNN model is primarily used to obtain a driver’s face image in real time.The PFLD algorithm was used to obtain the facial model positioning feature points,and the degree of driver fatigue was determined by combining the relevant parameters.The fatigue algorithm proposed in this paper can improve the effectiveness and accuracy of monitoring.Then,according to the LSTM network model,11 groups of key point information of the human body are obtained,and the human motion track is identified and then combined with the facial information to complete the judgment of driving behavior such as drinking water,smoking and walking.Through the PPG and ECG fusion algorithm based on LSTM,the reliability of the system to collect vital signs such as body temperature,blood pressure,heart rate and blood oxygen of the driver is improved.It was determined that the system could monitor a driver’s driving behavior in real time and consider its health management. 展开更多
关键词 Autonomous Driving Artificial Intelligence Face Recognition Behavior monitoring Fatigue Detection
原文传递
Identifying Money Laundering Process Using Indicators: The Case of Albania
7
作者 Llambrini Sota Fejzi Kolaneci 《Journal of Mathematics and System Science》 2014年第1期24-33,共10页
The main purpose of this study is to develop a mathematical model for calculating the probability of money laundering process, by monitoring the behavior of the client using 70 indicators of money laundering. The scie... The main purpose of this study is to develop a mathematical model for calculating the probability of money laundering process, by monitoring the behavior of the client using 70 indicators of money laundering. The scientific method used in this study (received from the Modern Criminology) has great investigative power and it is widely applicable. Hopefully the practical application of this study will increase greatly the probability of detection and punishment of the clients who are implicated in the process of money laundering. In particular, this study will be useful for banks, Financial Intelligence Unit (FIU) of Albania, Department of Economic Crime at the Ministry of Domestic Affairs and Albanian State Intelligence Service (SIS). Also, the investigation of money laundering will be a useful tool to detect other crimes, such as drug trafficking, human trafficking, illegal arms trade, etc. The prevention of money laundering is simultaneously a powerful strike against terrorism both on national and international levels. 展开更多
关键词 Illicit money money laundering indicators of money laundering the monitoring of the client's behavior theprobability of the detection of money laundering.
下载PDF
Multi-type sensor placement and response reconstruction for structural health monitoring of long-span suspension bridges 被引量:13
8
作者 You-Lin Xu Xiao-Hua Zhang +1 位作者 Songye Zhu Sheng Zhan 《Science Bulletin》 SCIE EI CAS CSCD 2016年第4期313-329,共17页
This study is devoted to the experimental validation of the multi-type sensor placement and response reconstruction method for structural health monitoring of long-span suspension bridges. The method for multi-type se... This study is devoted to the experimental validation of the multi-type sensor placement and response reconstruction method for structural health monitoring of long-span suspension bridges. The method for multi-type sensor placement and response reconstruction is briefly described. A test bed, comprising of a physical model and an updated finite element (P-E) model of a long-span suspension bridge is also concisely introduced. The proposed method is then applied to the test bed; the equation of motion of the test bed subject to ground motion, the objective function for sensor location optimization, the principles for mode selection and multi-type response reconstruction are established. A numerical study using the updated FE model is performed to select the sensor types, numbers, and locations. Subsequently, with the identified sensor locations and some practical considerations, fiber Bragg grating (FBG) sensors, laser displacement transducers, and accelerometers are installed on the physical bridge model. Finally, experimental investigations are conducted to validate the proposed method. The experimental results show that the reconstructed responses using the measured responses from the limited number of multitype sensors agree well with the actual bridge responses. The proposed method is validated to be feasible and effective for the monitoring of structural behavior of longspan suspension bridges. 展开更多
关键词 Long-span suspension bridges Structural behavior monitoring Multi-type sensorsMulti-type responses Experimental validation
原文传递
Apparel Shines for the Holidays Monitoring America's Attitudes and Behavior
9
作者 Guoyun 《纺织服装周刊》 2010年第45期9-9,共1页
Mixed messages about the nation’s economic health and tightened house- hold budgets have kept consumers cautious for most of 2010. Consumers have pegged their conf idence in the economy to the labor market, which has... Mixed messages about the nation’s economic health and tightened house- hold budgets have kept consumers cautious for most of 2010. Consumers have pegged their conf idence in the economy to the labor market, which has shown few signs of improvement. 展开更多
关键词 2010 Apparel Shines for the Holidays monitoring America’s Attitudes and Behavior
原文传递
A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System 被引量:5
10
作者 GUO Fangfang HU Yibing +2 位作者 XIU Longting FENG Guangsheng WANG Shuaishuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期126-132,共7页
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po... A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively. 展开更多
关键词 distributed security behavior monitoring peer-to- peer (P2P) data fusion DS evidence theory PSO algorithm
原文传递
Impact of different sampling rates on precise point positioning performance using online processing service 被引量:1
11
作者 Serdar Erol Reha Metin Alkan +1 位作者 İ.Murat Ozulu Veli Ilçi 《Geo-Spatial Information Science》 SCIE CSCD 2021年第2期302-312,I0008,共12页
In this study,the effect of different sampling rates(i.e.observation recording interval)on the Precise Point Positioning(PPP)solutions in terms of accuracy was investigated.For this purpose,a field test was carried ou... In this study,the effect of different sampling rates(i.e.observation recording interval)on the Precise Point Positioning(PPP)solutions in terms of accuracy was investigated.For this purpose,a field test was carried out inÇorum province,Turkey,on 11 September 2019.Within this context,a Geodetic Point(GP)was established and precisely coordinated.A static GNSS measurement was occupied on the GP for about 4-hour time at 0.10 second(s)/10 Hz measurement intervals with the Trimble R10 geodetic grade GNSS receiver.The original observation file was converted to RINEX format and then decimated into the different data sampling rates as 0.2 s,0.5 s,1 s,5 s,10 s,30 s,60 s,and 120 s.All these RINEX observation files were submitted to the Canadian Spatial Reference System-Precise Point Positioning(CSRS-PPP)online processing service the day after the data collection date by choosing both static and kinematic processing options.In this way,PPP-derived static coordinates,and the kinematic coordinates of each measurement epoch were calculated.The PPP-derived coordinates obtained from each decimated sampling intervals were compared to known coordinates of the GP for northing,easting,2D position,and height components.According to the static and kinematic processing results,high data sampling rates did not change the PPP solutions in terms of accuracy when compared to the results obtained using lower sampling rates.The results of this study imply that it was not necessary to collect GNSS data with high-rate intervals for many surveying projects requiring cm-level accuracy. 展开更多
关键词 Precise Point Positioning(PPP) online GNSS postprocessing service high-rate GNSS sampling rate monitoring structure behavior
原文传递
Malicious Code Detection Model Based on Behavior Association
12
作者 Lansheng Han Mengxiao Qian +2 位作者 Xingbo Xu Cai Fu Hamza Kwisaba 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期508-515,共8页
Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of s... Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable. 展开更多
关键词 malicious code behavior monitor behavior association pushdown automation
原文传递
Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution
13
作者 FU Jianming HE Jia +1 位作者 XE Mengfei MEI Xufen 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第1期89-101,共13页
There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of Chrome.However,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed ... There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of Chrome.However,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed maintenance of Chrome Web Store,the store becomes a platform for attackers to distribute malicious extensions.Existing static analysis methods can hardly detect obfuscated codes and dynamic codes injected by extensions,while dynamic detection methods have low coverage due to the need to meet various constraints when extensions are being executed.We propose a method to analyze Chrome extension behaviors dynamically based on direct execution of Java Script(JS).The core idea of this method is to convert the analysis of the whole extension into the analysis of each JS in the extension,bypassing the constraints(e.g.language,region,URL)of the extension itself,and improving the coverage of detection.The analysis of more than 44000 extensions showed that the method can effectively identify predefined behaviors.Among them,20 extensions had access to malicious domains,1113 extensions injected advertisements and 381 extensions collected users’passwords or cookies.At the same time,the number of URL requests obtained from this method is 177893,which is 52.44%more than that from traditional dynamic analysis method. 展开更多
关键词 Chrome extension malicious extension browser security behavior monitoring
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部