期刊文献+
共找到1,367篇文章
< 1 2 69 >
每页显示 20 50 100
Exploration of Industrial Internet Security Technology and Application from the Perspective of Generative Artificial Intelligence
1
作者 Dinggao Li Shengda Liao Zhuo Zheng 《Journal of Electronic Research and Application》 2024年第6期170-175,共6页
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog... In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers. 展开更多
关键词 generative artificial intelligence Industrial Internet security technology Application
下载PDF
Generalized dominance-based rough set approach to security evaluation with imprecise information 被引量:3
2
作者 Zhao Liang Xue Zhi 《High Technology Letters》 EI CAS 2010年第3期254-262,共9页
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic secur... The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation. 展开更多
关键词 security evaluation grey number multi-attribute group decision-making (MAGDM) generalized dominance-based rough set approach (G-DRSA)
下载PDF
Secure communication by generalized chaotic synchronization 被引量:5
3
作者 Lequan Min, Xianhua Zhang, and Miao YangApplied Science School, University of Science and Technology Beijing, Beijing 100083, China 《Journal of University of Science and Technology Beijing》 CSCD 2003年第2期75-78,共4页
Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provid... Chaotic communication is a rather new and active field of research. Althoughit is expected to have promising advantages, some investigators provide evidences that chaoticcommunication is not safety. This letter provides a new chaotic secure communication scheme based ona generalized synchronization theory of coupled system. The secret message hidden in the chaoticsource signal generated via the scheme is very difficult to be unmasked by so-called nonlineardynamic forecasting technique. One example for Internet communications was presented to illustratethe security of our scheme. 展开更多
关键词 secure communication generalized chaotic synchronization INTERNET
下载PDF
Generalized projective synchronization via the state observer and its application in secure communication 被引量:1
4
作者 吴迪 李娟娟 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第12期82-89,共8页
Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is propo... Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time. 展开更多
关键词 state observer generalized projective synchronization secure communication
下载PDF
The Security Assessment of General Anesthesia in Children with Mild to Moderate Upper Respiratory Tract Infection 被引量:1
5
作者 Juan Li Zhao-qiong Zhu De-xing Liu ChaoZhang Shu-wen Zheng 《麻醉与监护论坛》 2013年第4期253-257,共5页
关键词 上呼吸道感染 安全性评估 全身麻醉 儿童 围手术期 URI 血氧饱和度 并发症
下载PDF
Batch Private Keys Generation for RSA in Security Communication Systems 被引量:1
6
作者 陈运 陈新 《Journal of Electronic Science and Technology of China》 2005年第1期22-26,共5页
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex... RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users. 展开更多
关键词 information security system public key cryptosystem RSA key generation
下载PDF
Research of Security Constrained Dispatching for Monthly Generation Plan
7
作者 Rui Ge Hai-chao Wang Dun-nan Liu 《Energy and Power Engineering》 2013年第4期612-615,共4页
The dispatching for monthly generation plan is to manage the congestion considering the security constrains of the power grid, where the monthly generation plan is the result of vary monthly power exchange, including ... The dispatching for monthly generation plan is to manage the congestion considering the security constrains of the power grid, where the monthly generation plan is the result of vary monthly power exchange, including long-term power contract, power exchange among provinces and generation constitution exchanges. The application of monthly security constrained dispatching is with significant meaning for the security and stability of power grid. This paper brings forward the purpose and contents of security dispatching and introduces the working procedure and mathematic models. At last, the practical example of the Anhui Province power grid is introduced to explain the models. 展开更多
关键词 Direct PURCHASE by Major USERS security CONSTRAINED DISPATCHING MONTHLY generation PLAN
下载PDF
On a Generic Security Game Model
8
作者 Vivek Shandilya Sajjan Shiva 《International Journal of Communications, Network and System Sciences》 2017年第7期142-172,共31页
To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users,... To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The information is imperfect due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between the outputs of the sensors. We build a 5-state game to represent the interaction of the administrator with the user. The states correspond to 1) the user being out of the system in the Internet, and after logging in to the system;2) having low privileges;3) having high privileges;4) when he successfully attacks and 5) gets trapped in a honeypot by the administrator. Each state has its own action set. We present the game with a distinct perceived action set corresponding to each distinct information set of these states. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over the states, we use Euclidean distances between outputs of the sensors. A numerical simulation of an example game is presented to show the evaluation of rewards to the players and the preferred strategies. We also present the conditions for formulating the strategies when dealing with more than one attacker and making collaborations. 展开更多
关键词 security System Architecture STOCHASTIC GAME general SUM GAME Imperfect Information NUMERICAL Simulation
下载PDF
Security evaluation of compounded microbial flocculant 被引量:9
9
作者 马放 王博 +3 位作者 范春 杨基先 李百祥 刘艳滨 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第1期38-42,共5页
A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat ac... A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat acute toxicity test via mouth, salmonella assay in vitro, mouse micronucleus in vivo test and teratogenesis test were conducted to evaluate its general toxicity, genotoxicity and generative toxicity. The experimental results showed that this type of compounded microbial flocculant was a substantial non-toxic substance based on the fact that LD50 value was over 10 mg/kg. The results from salmonella in vivo test and mouse micronucleus in vivo test revealed that the compounded microbial flocculant is a genetically non-toxic substance. Furthermore, compounded microbial flocculant has little effect on the growth of all the rats, and any morphologic abnormal phenomenon hasn’t appeared. 展开更多
关键词 compounded microbial flocculant (CMBF) generative toxicity genetic toxicity security evaluation
下载PDF
Performance Analysis of Physical Layer Security over α-η-κ-μ Fading Channels 被引量:1
10
作者 Shaobo Jia Jiayan Zhang +1 位作者 Honglin Zhao Yao Xu 《China Communications》 SCIE CSCD 2018年第11期138-148,共11页
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,... In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model. 展开更多
关键词 Physical layer security α-η-κ-μgeneralized fading channels average secrecycapacity secrecy outage probability
下载PDF
A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions
11
作者 Monirah Al-Ajlan Mourad Ykhlef 《Computers, Materials & Continua》 SCIE EI 2024年第11期2053-2076,共24页
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener... The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps. 展开更多
关键词 Intrusion detection systems network security generative networks deep learning DATASET
下载PDF
生成式人工智能对数据安全保护的挑战及刑法应对
12
作者 聂立泽 王祯 《河南社会科学》 北大核心 2025年第1期56-63,共8页
随着生成式人工智能在多个领域的应用,数据安全保护面临新的挑战。在数据安全保护的路径选择上,传统模式选择以数据主体为锚定权利的基准,在赋予数据主体相关权利的基础上,以告知—同意原则作为数据主体的权利边界,建立涉及刑法、民法... 随着生成式人工智能在多个领域的应用,数据安全保护面临新的挑战。在数据安全保护的路径选择上,传统模式选择以数据主体为锚定权利的基准,在赋予数据主体相关权利的基础上,以告知—同意原则作为数据主体的权利边界,建立涉及刑法、民法等多个领域的数据安全制度。但不得不承认,伴随人工智能的发展,这种基于数据主体权利的数据保护模式逐渐表现出认知与结构性困难,需要从路径选择上进行转变。相对于以数据主体权利为核心的保护模式,刑法可以从风险的角度考虑,以贝克的风险社会理论作为理论参考,从承认数据主体具有完全理性转变为承认其具有有限理性,将数据安全保护的主要关注点从数据主体的权利保障转移到数据安全风险的预防和管控。此外,在数据安全保护的实质层面上,生成式人工智能侵害数据法益的行为可以概括为行为人利用或针对生成式人工智能实施的行为,以及生成式人工智能在演化、运行过程中“自主”实施的行为。刑法应以风险作为主要考量因素,结合已有规定对上述两种行为进行评价。 展开更多
关键词 生成式人工智能 风险预防 数据安全 刑法规制
下载PDF
Coverless Steganography for Digital Images Based on a Generative Model 被引量:5
13
作者 Xintao Duan Haoxian Song +1 位作者 Chuan Qin Muhammad Khurram Khan 《Computers, Materials & Continua》 SCIE EI 2018年第6期483-493,共11页
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ... In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability. 展开更多
关键词 generative model coverless image steganography STEGANALYSIS steganographic capacity security.
下载PDF
Theory and Applications of Discontinuous State Feedback Generating Chaos for Linear Systems
14
作者 张晓丹 王震 赵品栋 《Chinese Physics Letters》 SCIE CAS CSCD 2008年第2期397-400,共4页
We investigate a kind of chaos generating technique on a type of n-dimensional linear differential systems by adding feedback control items under a discontinuous state. This method is checked with some examples of num... We investigate a kind of chaos generating technique on a type of n-dimensional linear differential systems by adding feedback control items under a discontinuous state. This method is checked with some examples of numeric simulation. A constructive theorem is proposed for generalized synchronization related to the above chaotic system. 展开更多
关键词 generalized SYNCHRONIZATION DIFFERENTIAL-EQUATIONS securE COMMUNICATION DISCRETE CHAOS ANTICONTROL ARRAY KIND
下载PDF
Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
15
作者 Shuaishuai Zhu Yiliang Han 《China Communications》 SCIE CSCD 2021年第8期35-46,共12页
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally har... Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC problems.So the trapdoor in a public key encryption mechanism turns out to be a type of limited resource.In this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search technique.The basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input messages.The architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two generator.The evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors. 展开更多
关键词 generative model public key encryption indistinguishability model security model deep learning
下载PDF
从知识困境到认知陷阱:生成式技术驱动型信息生态系统安全问题研究 被引量:7
16
作者 白云 李白杨 +1 位作者 毛进 李纲 《信息资源管理学报》 CSSCI 2024年第1期13-21,共9页
生成式技术驱动型信息生态系统以生成式人工智能技术为核心,对整个信息环境中的知识传递与共享、认知流动与扩散过程发挥支撑和推动作用。然而,这种创新型的信息生态系统也伴随着知识安全和认知安全问题的出现。本文从知识环境和认知环... 生成式技术驱动型信息生态系统以生成式人工智能技术为核心,对整个信息环境中的知识传递与共享、认知流动与扩散过程发挥支撑和推动作用。然而,这种创新型的信息生态系统也伴随着知识安全和认知安全问题的出现。本文从知识环境和认知环境两个层面入手,对生成式技术驱动型信息生态系统的特点、优势与风险进行深入剖析,探索如何在符合人类价值观和社会伦理的前提下,充分发挥生成式人工智能的潜力,推动构建高效、安全、可持续发展的生成式技术驱动型信息生态系统。 展开更多
关键词 生成式人工智能 信息生态系统 知识安全 认知安全 知识环境 认知环境
下载PDF
Optimal Threshold Determination for Securities Exchange Volumes Using Improved Maximum Product of Spacing Methodology
17
作者 Peter Murage Joseph Mung’atu Everlyne Odero 《Open Journal of Statistics》 2019年第3期327-346,共20页
To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event.... To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties. 展开更多
关键词 Extreme Value Theory (EVT) MAXIMUM PRODUCT of SPACING (MPS) generalized Pareto Distribution (GPD) Peaks over Threshold (POT) NAIROBI securITIES EXCHANGE (NSE)
下载PDF
Smart Thermoelectric Earth-Air Generator Safety System
18
作者 Raşit Ahıska Özge Bakar 《Journal of Physical Science and Application》 2022年第1期6-11,共6页
In this study,the soil-air generator of the thermoelectric safety system working with soil heat was investigated.For this,a special electronic safety device was made and the output parameters of the device were invest... In this study,the soil-air generator of the thermoelectric safety system working with soil heat was investigated.For this,a special electronic safety device was made and the output parameters of the device were investigated.In order to investigate the operation of the thermoelectric“earth-air”generator safety system in real nature conditions,temperatures at the soil depth and soil surface equal to the length of the generator in four different regions of Ankara in four seasons were measured and modeled.Afterwards,physical parameters such as power P(W),voltage U(V)and current I(A)produced by the generator according toΔT were examined by using all this scientific information with a special test setup.According to the results obtained,it has been determined that the Intelligent thermoelectric earth-air generator safety system(ATES)has the feature of notifying the security units in case of area violation by generating its own electricity with the help of the heat in the soil without the need for any electrical cable.In addition,the environmentally friendly ATES system is an innovative product and it has been seen that it will be used in various fields,especially in military applications. 展开更多
关键词 THERMOELECTRICITY generATOR earth-air security system ATES
下载PDF
广义安全的本体、视界与范式:“关系和合度”解析 被引量:8
19
作者 余潇枫 《国际安全研究》 CSSCI 北大核心 2024年第1期4-26,163,共24页
基于中国关系本体论对安全的本体和视界进行解析,并且建构中国的安全理论范式,是为全球安全治理提供中国方案的重要方面。安全是一种什么样的“实在”,这是十分重要的本体论问题;而以什么样的“视界”考察安全,则是非常棘手的认识论难... 基于中国关系本体论对安全的本体和视界进行解析,并且建构中国的安全理论范式,是为全球安全治理提供中国方案的重要方面。安全是一种什么样的“实在”,这是十分重要的本体论问题;而以什么样的“视界”考察安全,则是非常棘手的认识论难题。“关系和合度”解析为“广义安全论”视域下的安全本体、视界与范式提供了哲学诠释。安全是“关系性实在”,是和合状态的共享性秩序,是呈现人与世界“广义性联系”的“关系和合度”。如果关系的和合程度是安全获得的程度,那么安全就是以“关系和合度”为自变量的函数,广义安全便是呈现人与世界“关系和合度”的安全,是“行为体间的优态共存”。广义安全凸显“关系和合度”的适然性,安全之境即是保持优态共存的“适然之境”,是当下所发生的一切关系的总体性和合,这为总体国家安全观以及全球安全观提供了理论支撑。广义安全观是集成与整合诸安全构成要素与安全领域的大安全理念,是“场域安全”思维的完好体现,是多重时空关系状态与多种活动性质特点的融合。 展开更多
关键词 广义安全 安全本体 安全视界 安全范式 关系和合度
下载PDF
IPv6地址驱动的云网络内生安全机制研究 被引量:1
20
作者 张博文 李冬 +1 位作者 赵贻竹 于俊清 《信息网络安全》 CSCD 北大核心 2024年第1期113-120,共8页
云网络可以根据不同业务场景对云平台虚拟网络资源快速部署与配置,是现代数据中心性能和安全的重要保障。但传统云网架构中IPv4支撑能力有限,无法实现网络端到端的透明传输,多租户特性使得云管理者对租户子网进行流量管理和约束异常困难... 云网络可以根据不同业务场景对云平台虚拟网络资源快速部署与配置,是现代数据中心性能和安全的重要保障。但传统云网架构中IPv4支撑能力有限,无法实现网络端到端的透明传输,多租户特性使得云管理者对租户子网进行流量管理和约束异常困难,外挂式的安全方案缺乏对不同租户流量的追溯能力,无法在源头对攻击行为进行限制。IPv6具有地址空间大、编址能力强、安全性高的特点,基于此,文章提出一种IPv6地址驱动的云网络内生安全机制,包括地址生成层、地址验证层和地址利用层。地址生成层以对称加密算法为基础,将租户身份信息嵌入IPv6地址后64位,修改DHCPv6地址分配策略,并基于Openstack Neutron进行实现。地址验证层设计实现了云网络动态源地址验证方法,针对不同端口状态集合设计针对性转移方法和安全策略。地址利用层基于IPv6真实地址的特性,实现了基于IPv6地址的数据包溯源机制和访问控制策略。 展开更多
关键词 云网络 内生安全 源地址验证 地址生成 IPV6
下载PDF
上一页 1 2 69 下一页 到第
使用帮助 返回顶部