期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
The effectiveness of the department of defense's field manual 3-11 in detecting,deterring and degrading the breach of a combat base by a human-borne with bioagent(HBBA):perceptions of security personnel
1
作者 George Edafese Alakpa John W.Collins Jr 《Journal of Medical Colleges of PLA(China)》 CAS 2016年第2期66-72,共7页
Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Si... Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent(HBBA) terrorist breach at an entry control point(ECP).Methods: This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α>0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0%; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.Results: The results revealed that while over 60.0% of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other tactics, techniques and procedures(TTPs) would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0% suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.Conclusion: If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86(intelligence), might increase. 展开更多
关键词 Do D FM 3-11 BIOTERRORISM Breach of COMBAT ECP HBBA TERRORIST security PERSONNEL Perception
下载PDF
Special Plan for Population,Employment and Social Security Between 2001-2005
2
《China Population Today》 2002年第1期2-4,共3页
关键词 security Special Plan for Population Employment and Social security Between 2001-2005
下载PDF
Enhancement of Multicast Security with Opportunistic Relaying Technique over κ-μ Shadowed Fading Channels
3
作者 Ashik Alam Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期121-137,共17页
The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i... The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers. 展开更多
关键词 Opportunistic Relaying Probability of Non-Zero Secrecy Multicast Capacity (PNSMC) secure Wireless Multicasting secure Outage Probability for Multicasting (SOPM) κ-μ Shadowed Fading Channel
下载PDF
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
4
作者 Mohammed Mohammed Raoof 《Journal of Information Security》 2024年第2期232-244,共13页
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati... Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches. 展开更多
关键词 SP 800-66 Revision 1 SP 800-66 Revision 2 HIPAA Compliance security Breaches Risk Management Framework (RMF) Internet of Things (IoT) Artificial Intelligence (AI)
下载PDF
Ecological Effects of Remote Smallsand Descending on Urban Area:Deduced from the "Mud - Snow" in Changchun City 被引量:2
5
作者 Wu Donghui Hu Ke +3 位作者 Wang Yun Yang Deming Zhao Wei Chen Shan 《Global Geology》 2000年第2期230-235,共6页
A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with sn... A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with snow provides the best samples to conduct a quantitative research on the possible impacts of city - ecology. In the 253km2 urban district area of Changchun city, smallsands accumulated up to more than 3000t on April 7, according to the calculation of four "mud - snow" samples. After naturally melting in room temperature, two samples are taken to do quarantine of "invasion bacteria". As a preliminary result, the individual amount of bacterium in 1 ml sample water is up to 8. 9 x 104 or 1. 05 x 105, and it is estimated that there are 640 million "invasion bacterium" individuals in one square meter. This study proves that other than the obvious environmental effects of sandstorm, the urban micro - ecosystem is very possible under threat by the "invasion bacterium" accompanied by remote descending smallsand. 展开更多
关键词 REMOTE smallsand Bacteria - total ECOLOGICAL security Changchun city
下载PDF
基于SCC映射的彩色图像分块压缩加密算法 被引量:3
6
作者 张昊 王晓庆 +1 位作者 谢红薇 刘雨心 《计算机工程与设计》 北大核心 2022年第7期1801-1809,共9页
为解决传统的一维混沌映射由于吸引子结构单一而面临的安全问题,提出一种耦合Sine映射和Cubic映射的混沌系统。通过单一映射的控制参数进行相互耦合,使系统的状态信号发生较大的变化;压缩感知针对所提出的耦合Sine-Cubic混沌映射,分析... 为解决传统的一维混沌映射由于吸引子结构单一而面临的安全问题,提出一种耦合Sine映射和Cubic映射的混沌系统。通过单一映射的控制参数进行相互耦合,使系统的状态信号发生较大的变化;压缩感知针对所提出的耦合Sine-Cubic混沌映射,分析其在混沌性和随机性方面的性能,表明其优于现有的一些2D混沌系统,具有更高安全性能;基于该系统良好的密码学特性,结合分块压缩感知技术和按行扩散的方法,设计图像加密和压缩算法。通过对加解密及压缩结果的实验分析,得出该算法在随机性、敏感性、抗干扰性和抗攻击性等多个方面具有良好性能,安全性和鲁棒性高。 展开更多
关键词 安全散列算法-384(secure hash algorithm-384 SHA-384) 图像加密 图像压缩 超混沌 Sine-Cubic映射 压缩感知
下载PDF
河北太行山区生态安全评价与防护措施的研究 被引量:2
7
作者 刘体明 刘芸芸 《安徽农业科学》 CAS 北大核心 2010年第27期15367-15369,共3页
应用河北太行山区生态安全综合评价模型,对太行山区的生态安全进行了初步评价,从生态安全预警、生态安全保障2个方面,对存在的问题提出了防护措施。
关键词 太行山 生态环境 生态安全评价 措施
下载PDF
近30年宝鸡市城市化水平与城市生态安全的定量关系研究 被引量:4
8
作者 王惠飞 任志远 +1 位作者 薛亮 李熙恒 《干旱区资源与环境》 CSSCI CSCD 北大核心 2009年第4期19-23,共5页
首先运用综合评价法对宝鸡市近30年的城市化水平进行了测度,然后运用生态安全综合指数法对宝鸡市城市生态安全进行了定量评价,最后对两者进行了相关分析和多元回归分析。结果表明:最能体现城市化发展水平的"城市现代化水平"... 首先运用综合评价法对宝鸡市近30年的城市化水平进行了测度,然后运用生态安全综合指数法对宝鸡市城市生态安全进行了定量评价,最后对两者进行了相关分析和多元回归分析。结果表明:最能体现城市化发展水平的"城市现代化水平"因子与城市生态安全之间存在着极强的正相关关系,城市现代化水平的发展是城市生态环境变好的主要影响因子。结合宝鸡市生态环境仍处于不安全状态、存在诸多问题的现状,提出了协调"加快城市化进程"和"良化城市生态环境"之间关系的三点建议。 展开更多
关键词 城市化水平 生态安全 可持续发展 宝鸡市
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部