期刊文献+
共找到3,321篇文章
< 1 2 167 >
每页显示 20 50 100
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
1
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
2
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
Adaptive multi-channel Bayesian graph attention network for IoT transaction security
3
作者 Zhaowei Liu Dong Yang +1 位作者 Shenqiang Wang Hang Su 《Digital Communications and Networks》 SCIE CSCD 2024年第3期631-644,共14页
With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of ... With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of data created by numerous 5G IoT devices,the Ethereum platform has become a tool for the storage and sharing of IoT device data,thanks to its open and tamper-resistant characteristics.So,Ethereum account security is necessary for the Internet of Things to grow quickly and improve people's lives.By modeling Ethereum trans-action records as a transaction network,the account types are well identified by the Ethereum account classifi-cation system established based on Graph Neural Networks(GNNs).This work first investigates the Ethereum transaction network.Surprisingly,experimental metrics reveal that the Ethereum transaction network is neither optimal nor even satisfactory in terms of accurately representing transactions per account.This flaw may significantly impede the classification capability of GNNs,which is mostly governed by their attributes.This work proposes an Adaptive Multi-channel Bayesian Graph Attention Network(AMBGAT)for Ethereum account clas-sification to address this difficulty.AMBGAT uses attention to enhance node features,estimate graph topology that conforms to the ground truth,and efficiently extract node features pertinent to downstream tasks.An extensive experiment with actual Ethereum transaction data demonstrates that AMBGAT obtains competitive performance in the classification of Ethereum accounts while accurately estimating the graph topology. 展开更多
关键词 Internet of things Graph representation learning Node classification security mechanism
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
4
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
5
作者 Jian Shang Runmin Guan Wei Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2609-2626,共18页
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ... The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks. 展开更多
关键词 MICROGRID data security storage node trust degree directed acyclic graph data structure consensus mechanism secure multi-party computing blockchain
下载PDF
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing 被引量:5
6
作者 ZHOU Zheng ZHANG Jun +1 位作者 LI Jian LIU Yi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1437-1440,共4页
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att... Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed. 展开更多
关键词 trusted computing security domain mechanism attack immunity venture limitation
下载PDF
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 被引量:4
7
作者 Ming Wan Jiawei Li +2 位作者 Ying Liu Jianming Zhao Jiushuang Wang 《China Communications》 SCIE CSCD 2021年第1期130-150,共21页
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ... Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a significant topic because current networked control systems are supporting various critical infrastructures to offer vital utility services.By comparing with traditional IT systems,this paper first analyzes the uncontrollable cyber threats and classified attack characteristics,and elaborates the intrinsic vulnerabilities in current networked control systems and novel security challenges in future Industrial Internet.After that,in order to overcome partial vulnerabilities,this paper presents a few representative security mechanisms which have been successfully applied in today’s industrial control systems,and these mechanisms originally improve traditional IT defense technologies from the perspective of industrial availability.Finally,several popular security viewpoints,adequately covering the needs of industrial network structures and service characteristics,are proposed to combine with burgeoning industrial information technologies.We target to provide some helpful security guidelines for both academia and industry,and hope that our insights can further promote in-depth development of industrial cyber security. 展开更多
关键词 industrial cyber threats industrial characteristics VULNERABILITIES security mechanisms and viewpoints
下载PDF
Foreign Grain Security Mechanisms and Implications for China 被引量:1
8
作者 Shuhua CAO Lei NIE Weipeng MA 《Asian Agricultural Research》 2014年第3期1-5,10,共6页
With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grai... With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security. 展开更多
关键词 GRAIN security FOREIGN COUNTRIES China mechanism F
下载PDF
Establish the Long-effective Mechanism of Food Security in China 被引量:1
9
作者 Wang Yapeng Fang Lingli 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第1期25-35,共11页
In despite of fluctuation in recent years, the grain yield in China has been increasing, which relieves the conflict between supply and demand and turns the situation of food security good. However, because of the rap... In despite of fluctuation in recent years, the grain yield in China has been increasing, which relieves the conflict between supply and demand and turns the situation of food security good. However, because of the rapid increase in food consumption, the conflicts of food quality and structure in the supply and demand equilibrium has become more and more obvious and the long-effective mechanism of food security has not been estab-lished yet. It is found that the factors affecting food security in China include the scarcity and dissipation of resources, farmers’ low enthusiasm in planting grain crops and the inappropriateness of the emphasis and measures of macro-economic regulation and control. Therefore, the authors advance to optimize resources allocation, strengthen macro-economic regulation and control and policy stimulation and establish the mechanism of allocating grain production cost, to set up the long-effective mechanism of China food security and keep it stable in the long term. 展开更多
关键词 food security long-effective mechanism resource allocation policy stimulation cost allocation
下载PDF
Countermeasures for Establishing a Long-term Security Mechanism for Landless Farmers
10
作者 Jiefang ZHU 《Asian Agricultural Research》 2020年第1期25-27,31,共4页
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ... In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development. 展开更多
关键词 Landless FARMERS LONG-TERM security mechanism COUNTERMEASURES
下载PDF
Coordination Mechanism of the Legal Protection of Resource Security with Its Relative Laws
11
作者 Chen Demin Wang Huabing 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第3期21-26,共6页
The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordin... The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility. 展开更多
关键词 resource security legal protection relative laws mechanism
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
12
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm security mechanism Computational overhead
下载PDF
A Research on Improvement of Hadoop Security Mechanism
13
《International English Education Research》 2013年第12期90-92,共3页
. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first ... . Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs. 展开更多
关键词 HADOOP security mechanism HDFS MapReduce secure multicast REKEYING
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
14
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ... Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions. 展开更多
关键词 Cloud Services Access mechanism security
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
15
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu... In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract. 展开更多
关键词 Psychological Contract public security colleges and universities teacher management mechanism
下载PDF
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET
16
作者 S.Neelavathy Pari K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols 被引量:1
17
作者 Jianzhong Zhao 《Journal of Quantum Information Science》 CAS 2022年第3期53-63,共11页
Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol was followed by the QKD protocols publis... Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol was followed by the QKD protocols published by Ekert (1991) (E91) and Bennett (1992) (B92). Some authors proved security of the theoretical QKD protocols in different theoretical frameworks by defining security of QKD protocols differently. My argument is that the previous proofs of security are neither unique nor exhaustive for each theoretical QKD protocol, which means that proof of security of the theoretical QKD protocols has not been completed or achieved. The non-uniqueness and the non-exhaustiveness of the proofs will lead to more proofs. However, a coming “proof” of security of the theoretical QKD protocols is possible to be a disproof. The research by quantum mechanics in this paper disproves security of the theoretical QKD protocols, by establishing the theoretical framework of quantum mechanical proof, defining security of QKD protocols, establishing the quantum state of the final key of the theoretical protocols from their information leakages, and applying Grover’s fast quantum mechanical algorithm for database search to the quantum state of the final key to result in the Insecurity Theorem. This result is opposite to those of the previous proofs where the theoretical QKD protocols were secure. It is impossible for Alice and Bob to protect their communications from information leakage by stopping or canceling the protocols. The theoretical QKD keys are conventional and basically insecure. Disproof of security of the theoretical QKD protocols is logical. 展开更多
关键词 Quantum mechanics Quantum Cryptography Quantum Computation security PROOF
下载PDF
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger 被引量:1
18
作者 Robert E. Endeley 《Journal of Information Security》 2018年第1期95-99,共5页
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has... The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security. 展开更多
关键词 INSTANT MESSAGING WhatsApp end-to-end ENCRYPTION National security Privacy
下载PDF
Code mechanical solidification and verification in MEMS security devices
19
作者 张卫平 陈文元 +2 位作者 赵小林 李胜勇 姜勇 《Journal of Shanghai University(English Edition)》 CAS 2006年第4期334-338,共5页
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c... The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective. 展开更多
关键词 MEMS (micro-electromechanical systems) security device code mechanical solidification and verification virtual machine of code mechanism (VMCM) ternary system.
下载PDF
Study on the Establishment of a Long-effect Mechanism for China's Securities Investor Education
20
作者 Yunlei HUO 《International English Education Research》 2014年第9期97-99,共3页
Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, ... Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, the long-effect mechanism for investor education is not only a demand of China's securities market on its healthy development, but also an objective reality that China's investor education is necessary to confront with. For these reasons, it is necessary for China to deepen investor education, expand investor education platform, strengthen risk prevention, and take initiative to build up a multi-level investor education system, and ultimately establish and improve a long-effect mechanism for investor education, so as to ensure the stable, harmonious and order development of China's Securities market in futures. 展开更多
关键词 securities Investment EDUCATION Long-effect mechanism
下载PDF
上一页 1 2 167 下一页 到第
使用帮助 返回顶部