期刊文献+
共找到190篇文章
< 1 2 10 >
每页显示 20 50 100
Multilevel security model for ad hoc networks 被引量:1
1
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
下载PDF
Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack
2
作者 Saraswathi Shunmuganathan 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期67-79,共13页
The exponential advancement in telecommunication embeds the Internet in every aspect of communication.Interconnections of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one... The exponential advancement in telecommunication embeds the Internet in every aspect of communication.Interconnections of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services.Irrespective of the protective measures incorporated in the communication infrastructure,FA still persists due to the lack of global cooperation.Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point.Providing mitigation at one or the other end may not be a complete solution.To insist on better protection againstflooding attacks,this work proposes a cooperative multilevel defense mechanism.The proposed cooperative multilevel defense mechanism consists of two-level of mitigation.In thefirst level,it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag(TSRT),as a source end countermeasure for High-Rate Flooding Attacks(HRFA)and spoofing attacks.In the second level,the accent is to discriminate normal traffic after Distributed Denial of Service(DDoS)traffic and drop the DDoS traffic at the destination end.Flow Congruence-based Selective Pushback(FCSP),as a destination-initiated countermeasure for the Low Rate Flooding Attack(LRFA).The source and the destination cooperate to identify and block the attack.A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the attack.The presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in NS-2.The investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack. 展开更多
关键词 FLOODING SPOOFING cooperative solution multilevel security FILTERING pushback
下载PDF
应用WEMLS的安全数据集成模型 被引量:1
3
作者 孟宇龙 印桂生 王慧强 《计算机工程》 CAS CSCD 北大核心 2010年第12期1-3,共3页
针对现有的安全域存在许多异构安全数据需要集成的问题,引入多级安全策略(MLS)的思想,提出一种应用扩展权值MLS策略(WEMLS)的安全数据集成模型。定义可信权值的概念,建立进程授权机制和信任计算机制。应用结果表明,该模型能使可信进程... 针对现有的安全域存在许多异构安全数据需要集成的问题,引入多级安全策略(MLS)的思想,提出一种应用扩展权值MLS策略(WEMLS)的安全数据集成模型。定义可信权值的概念,建立进程授权机制和信任计算机制。应用结果表明,该模型能使可信进程更灵活地访问客体。 展开更多
关键词 多级安全策略 安全数据 可信权值 本体
下载PDF
基于数据包头序列的物联网恶意流量检测
4
作者 卫重波 谢高岗 +1 位作者 刁祖龙 张广兴 《高技术通讯》 CAS 北大核心 2024年第8期798-806,共9页
现有的基于机器学习(ML)的恶意流量检测方法,通常以高维的流量特征作为输入,并采用复杂模型,在实践中产生高误报率且资源占用较高。更重要的是,加密协议的广泛使用,使得数据包有效载荷特征很难被访问。幸运的是,物联网(IoT)设备的网络... 现有的基于机器学习(ML)的恶意流量检测方法,通常以高维的流量特征作为输入,并采用复杂模型,在实践中产生高误报率且资源占用较高。更重要的是,加密协议的广泛使用,使得数据包有效载荷特征很难被访问。幸运的是,物联网(IoT)设备的网络行为通常是有规律和周期性的,该特征反映在通信数据包序列上,每个数据包一定程度上描述了一次网络事件。基于此,本文提出了基于数据包头序列的恶意流量检测方法。它将流量序列转换为网络事件序列,并计算一组特征(即序列性、频率性、周期性和爆发性)来描述网络行为。实验环境包含一组真实的物联网设备,并将提出的方法部署在树莓派模拟的网关上。实验结果表明,与最新的检测方法相比,本文提出的方法能够在复杂网络环境下保持高准确性和低误报率,并提升了处理速率。 展开更多
关键词 机器学习(ML) 恶意流量检测 网络行为 物联网(IoT)安全 数据包头序列
下载PDF
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
5
作者 Asma Hassan Alshehri 《Computers, Materials & Continua》 SCIE EI 2024年第2期2767-2786,共20页
Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,... Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics. 展开更多
关键词 security fake review semi-supervised learning ML algorithms review detection
下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
6
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
7
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(mls) access control blockchain multi-chain smart contract
下载PDF
MLS评价法在安全评价中的应用
8
作者 刘云 郭嘉昒 王保民 《机械管理开发》 2010年第5期71-72,共2页
在化工领域常用的安全评价方法有很多,采用MLS评价法对化工厂进行安全评价,建立具体模型,并对某一化工厂单元安全现状进行了评价。
关键词 化工安全 安全评价 事故 损失 mls评价法
下载PDF
MLS评价法在安全评价中的应用
9
作者 刘云 王保民 《化工中间体》 2010年第1期51-54,共4页
在化工领域常用的安全评价方法有很多,在本文中用MLS评价法对化工厂进行安全评价,建立具体模型,并对某一化工厂单元安全现状进行了评价。
关键词 化工安全 安全评价 事故 损失 mls评价法
下载PDF
MLS评价法在安全评价中的应用
10
作者 刘云 王保民 《化工中间体》 2010年第5期61-64,共4页
在化工领域常用的安全评价方法有很多,在本文中用MLS评价法对化工厂进行安全评价,建立具体模型,并对某一化工厂单元安全现状进行了评价。
关键词 化工安全 安全评价 事故 损失 mls评价法
下载PDF
Integrity Based Access Control Model for Multilevel XML Document
11
作者 洪帆 冯学斌 +1 位作者 黄志 郑明辉 《Journal of Southwest Jiaotong University(English Edition)》 2008年第2期109-114,共6页
XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents a... XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application. 展开更多
关键词 XML Access control multilevel security INTEGRITY
下载PDF
我国惠民保可持续发展探究 被引量:3
12
作者 董捷 吴海鹏 《保险职业学院学报》 2023年第1期23-28,共6页
具有低保费、高保额、不设健康告知等特点的惠民保在2020年、2021年经历了爆发式的增长,显示了其强大的生命力,为完善我国多层次的医疗保障体系做出了重要贡献。本文介绍了惠民保的发展现状,针对在其发展过程中存在的参与主体权责不清... 具有低保费、高保额、不设健康告知等特点的惠民保在2020年、2021年经历了爆发式的增长,显示了其强大的生命力,为完善我国多层次的医疗保障体系做出了重要贡献。本文介绍了惠民保的发展现状,针对在其发展过程中存在的参与主体权责不清晰、产品同质化严重、逆选择与“死亡螺旋”、保障重点不明确、赔付风险增加等问题,提出明确政府定位、引导保险公司良性竞争、精准识别既往症人群、明确保障重点等促进惠民保可持续发展的建议。 展开更多
关键词 惠民保 多层次医疗保障体系 可持续发展
下载PDF
建设立体化的多层次社会保障体系 被引量:5
13
作者 毕天云 《学术探索》 2023年第4期121-127,共7页
健全多层次社会保障体系是新时代我国社会保障事业发展的必然趋势和基本目标,但学术界和实务界对多层次社会保障体系的认识既不统一也不全面。多层次不是单向度的多层次而是多维度的多层次,不是平面化的多层次而是立体化的多层次。多层... 健全多层次社会保障体系是新时代我国社会保障事业发展的必然趋势和基本目标,但学术界和实务界对多层次社会保障体系的认识既不统一也不全面。多层次不是单向度的多层次而是多维度的多层次,不是平面化的多层次而是立体化的多层次。多层次社会保障体系是需求满足、目标定位、责任主体、统筹范围多层次的社会保障体系,四个维度的多层次之间相互作用,共同构成系统化、整体化、立体化的多层次社会保障体系。 展开更多
关键词 社会保障体系 多层次 多维度 立体化
下载PDF
Intrusion Detection System Through Deep Learning in Routing MANET Networks
14
作者 Zainab Ali Abbood DoguÇagdaşAtilla Çagatay Aydin 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期269-281,共13页
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For... Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For reasons including node mobility,due to MANET’s potential to provide small-cost solutions for real-world contact challenges,decentralized management,and restricted bandwidth,MANETs are more vulnerable to security threats.When protecting MANETs from attack,encryption and authentication schemes have their limits.However,deep learning(DL)approaches in intrusion detection sys-tems(IDS)can adapt to the changing environment of MANETs and allow a sys-tem to make intrusion decisions while learning about its mobility in the environment.IDSs are a secondary defiance system for mobile ad-hoc networks vs.attacks since they monitor network traffic and report anything unusual.Recently,many scientists have employed deep neural networks(DNNs)to address intrusion detection concerns.This paper used MANET to recognize com-plex patterns by focusing on security standards through efficiency determination and identifying malicious nodes,and mitigating network attacks using the three algorithms presented Cascading Back Propagation Neural Network(CBPNN),Feedforward-Neural-Network(FNN),and Cascading-Back-Propagation-Neural-Network(CBPNN)(FFNN).In addition to Convolutional-Neural-Network(CNN),these primary forms of deep neural network(DNN)building designs are widely used to improve the performance of intrusion detection systems(IDS)and the use of IDS in conjunction with machine learning(ML).Further-more,machine learning(ML)techniques than their statistical and logical methods provide MANET network learning capabilities and encourage adaptation to differ-ent environments.Compared with another current model,The proposed model has better average receiving packet(ARP)and end-to-end(E2E)performance.The results have been obtained from CBP,FFNN and CNN 74%,82%and 85%,respectively,by the time(27,18,and 17 s). 展开更多
关键词 ARP CBPNN CNN DNN DL E2E FFNN IDS ML MANET security
下载PDF
A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
15
作者 Seyoung Lee Wonsuk Choi +2 位作者 InsupKim Ganggyu Lee Dong Hoon Lee 《Computers, Materials & Continua》 SCIE EI 2023年第9期3413-3442,共30页
Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the ... Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the datasets used for training and evaluation.Despite the availability of several datasets for automotive IDSs,there has been a lack of comprehensive analysis focusing on assessing these datasets.This paper aims to address the need for dataset assessment in the context of automotive IDSs.It proposes qualitative and quantitative metrics that are independent of specific automotive IDSs,to evaluate the quality of datasets.These metrics take into consideration various aspects such as dataset description,collection environment,and attack complexity.This paper evaluates eight commonly used datasets for automotive IDSs using the proposed metrics.The evaluation reveals biases in the datasets,particularly in terms of limited contexts and lack of diversity.Additionally,it highlights that the attacks in the datasets were mostly injected without considering normal behaviors,which poses challenges for training and evaluating machine learning-based IDSs.This paper emphasizes the importance of addressing the identified limitations in existing datasets to improve the performance and adaptability of automotive IDSs.The proposed metrics can serve as valuable guidelines for researchers and practitioners in selecting and constructing high-quality datasets for automotive security applications.Finally,this paper presents the requirements for high-quality datasets,including the need for representativeness,diversity,and balance. 展开更多
关键词 Controller area network(CAN) intrusion detection system(IDS) automotive security machine learning(ML) DATASET
下载PDF
居民卫生应急素养水平及其影响因素分析 被引量:1
16
作者 田甜 周倩 +1 位作者 倪洁 赵晓恒 《医学与法学》 2023年第4期83-88,共6页
调研四川省居民卫生应急素养水平及其影响因素,以供居民卫生应急素养提升策略及相关法律法规的制定与完善作参考——以自制问卷并按方便抽样的方法,选取四川省18岁及以上的常住居民作调查,运用χ2检验、多水平Logistic回归模型等统计方... 调研四川省居民卫生应急素养水平及其影响因素,以供居民卫生应急素养提升策略及相关法律法规的制定与完善作参考——以自制问卷并按方便抽样的方法,选取四川省18岁及以上的常住居民作调查,运用χ2检验、多水平Logistic回归模型等统计方法作分析研究,得数据显示:居住地、年龄、婚姻状况、民族、学历、共同居住人数、职业、月收入以及所在区(县)是否出现过确诊病例等,均对居民卫生应急素养水平影响显著;四川省居民卫生应急素养水平总体偏低,其有待进一步提升,且应重点关注特定人群,针对其群体特性采取多样性的科普方式并提供法律保护。 展开更多
关键词 居民卫生应急素养 问卷调查 多水平Logistic回归模型 卫生应急教育 法律保障
下载PDF
Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security
17
作者 Chaimae Hazman Azidine Guezzaz +1 位作者 Said Benkirane Mourade Azrour 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期929-947,共19页
Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface... Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively. 展开更多
关键词 intrusion detection LSTM IoT security ML DL TPU
原文传递
医疗救助制度的完善路径研究
18
作者 李成志 《中国医疗保险》 2023年第12期45-49,共5页
医疗救助制度需要解决救助对象识别、救助标准厘定、潜在困难群体保障三大核心问题,需要从制度内部与外部进行完善的路径建构。医疗救助制度内部,探索建立以家庭灾难性卫生支出为基础的因病支出型困难的评定标准;根据分类救助原则,对不... 医疗救助制度需要解决救助对象识别、救助标准厘定、潜在困难群体保障三大核心问题,需要从制度内部与外部进行完善的路径建构。医疗救助制度内部,探索建立以家庭灾难性卫生支出为基础的因病支出型困难的评定标准;根据分类救助原则,对不同困难人员设置不同的报销梯度以及保障范围,以完善医疗救助待遇标准。医疗救助制度外部,按照“先保险、后救助”的原则有序衔接基本医保、大病保险和医疗救助,形成贯序减负机制,通过信息系统一体化和责任主体相对统一,提升管理效率;畅通社会救助体系的家庭经济状况核对数据共享,建立因病致贫预警机制以及预警结果处置机制;通过项目化或产品化的慈善帮扶或商业健康险建立政策范围外医疗费用减负机制。 展开更多
关键词 医疗救助 多层次医疗保障 边缘困难群体
下载PDF
基于行为的结构化文档多级访问控制 被引量:17
19
作者 熊金波 姚志强 +2 位作者 马建峰 李凤华 李琦 《计算机研究与发展》 EI CSCD 北大核心 2013年第7期1399-1408,共10页
针对当前云计算环境中因缺乏多级安全机制而使结构化文档容易产生信息泄露和非授权访问等问题,提出基于行为的多级访问控制(action-based multilevel access control model,AMAC)模型并给出策略的形式化描述.利用信息流中的不干扰理论建... 针对当前云计算环境中因缺乏多级安全机制而使结构化文档容易产生信息泄露和非授权访问等问题,提出基于行为的多级访问控制(action-based multilevel access control model,AMAC)模型并给出策略的形式化描述.利用信息流中的不干扰理论建立AMAC不干扰模型,并证明AMAC模型中多级访问控制策略的安全性.与已有访问控制模型的比较与分析表明,AMAC模型既可以利用角色、上下文和用户访问行为以提高访问控制策略的灵活性,还可以依据用户,用户访问行为和结构化文档的安全等级实现多级安全机制. 展开更多
关键词 多级安全 多级访问控制 结构化文档 不干扰理论 云计算 访问行为
下载PDF
一种具有可信度特征的多级安全模型 被引量:13
20
作者 谭智勇 刘铎 +1 位作者 司天歌 戴一奇 《电子学报》 EI CAS CSCD 北大核心 2008年第8期1637-1641,共5页
为解决现有多级安全系统中存在的可信主体安全隐患和系统可用性较差的问题,本文提出一种具有可信度特征的多级安全模型.通过在BLP模型中增加主客体的可信度标记和可信度评估函数,该模型可以准确地评估访问请求的可信度以及主客体可信度... 为解决现有多级安全系统中存在的可信主体安全隐患和系统可用性较差的问题,本文提出一种具有可信度特征的多级安全模型.通过在BLP模型中增加主客体的可信度标记和可信度评估函数,该模型可以准确地评估访问请求的可信度以及主客体可信度随访问行为变化的情况.以此可信度评估机制为基础,该模型建立了对可信主体的约束机制,使系统可以赋予更多主体有限程度的特权,增加了系统的灵活性和可用性. 展开更多
关键词 多级安全 可信度 BLP(Bell-La Padula)安全模型 访问控制
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部