Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the...Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods.To solve problems above in current network security quantitative evaluation methods,this paper verified the high relevance degree between type and exploitable score of vulnerability,proposed a new vulnerability quantitative grading method ICVSS,ICVSS can explore attack path using continuity level defined by privilege,add vulnerability type to measure indexes of exploitable metrics and use Analytic Hierarchy Process(AHP)to quantify the influence of vulnerability type on exploitable level.Compared with CVSS and WIVSS,ICVSS is proved that it can discover attack path consist of a sequence of vulnerabilities for network security situation evaluation,and has more accuracy and stability.展开更多
China(herein referred as China’s mainland,and excluding Hong Kong,Macao and Taiwan)ranks as the world’s leading fishing nation,with approximately 11.1 million tons of domestic marine catch acquired in 2017.Marine fi...China(herein referred as China’s mainland,and excluding Hong Kong,Macao and Taiwan)ranks as the world’s leading fishing nation,with approximately 11.1 million tons of domestic marine catch acquired in 2017.Marine fisheries resources in China are mainly exploited by its 11 coastal provinces and municipalities,and the development of fishing industry varies among them.However,few studies have examined the exploitation history of the 11 coastal provinces and municipalities.In this paper,we systematically quantified the exploitation history of marine fishery resources in China and then measured the vulnerability of the 11 coastal provinces and municipalities of China to a reduction in marine catches.Our analysis suggested that Chinese marine fisheries experienced rapid growth from the mid-1980 s to the end of the 20 th century,and this rapid increase in marine catches were mainly promoted by increased fishing effort.The total primary production required level amounted to approximately 80%of the average primary productivity in 2017,and Zhejiang,Fujian,Shandong,Hainan and Guangdong provinces were the main fishing provinces in China.By assessing three dimensions of vulnerability(exposure,sensitivity and adaptive capacity)to the impacts of a reduction in marine catches in the 11 coastal provinces and municipalities,we found that Hainan,Guangxi,Zhejiang and Fujian provinces had high or very high vulnerability,while the municipalities of Shanghai and Tianjin had low vulnerability.Identifying suitable adaptation policies and management plans based on the differences in vulnerability among coastal provinces is important in sustainable fisheries management.展开更多
There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the pres...There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the present study, we propose a stochastic model to quantify the risk associated with the overall network using Markovian process in conjunction with Common Vulnerability Scoring System (CVSS) framework. The model we developed uses host access graph to represent the network environment. Utilizing the developed model, one can filter the large amount of information available by making a priority list of vulnerable nodes existing in the network. Once a priority list is prepared, network administrators can make software patch decisions. Gaining in depth understanding of the risk and priority level of each host helps individuals to implement decisions like deployment of security products and to design network topologies.展开更多
Unregulated commercial-scale exploitation of trees is an indication of the extent of threat to various tree species. The study examined the threat status of commercially exploited trees in the forest estates of South ...Unregulated commercial-scale exploitation of trees is an indication of the extent of threat to various tree species. The study examined the threat status of commercially exploited trees in the forest estates of South eastern Nigeria. Specifically, it identified tree species under threat, and categorized them into threat classes, as well as determined the rate at which exploited trees were slipping into extinction. The study utilized the IUCN’s threat categorization criteria, in determining the threat status of commercially exploited trees. This study combined both secondary and primary data sources generated through Forest Inventory records, Tree Felled Analysis records and Participatory Survey. Data such as population size and density of species, level of exploitation and threat sensitive social and ecological parameters were obtained and applied against the IUCN criteria. Twenty-eight (28) trees species representing Thirty-two percent (32%) of eighty-six (86) commercially exploited trees were identified as threatened, ranging from the Vulnerable to the Critically Endangered categories. The theory of small and declining population paradigms were found to be of relevance in explaining the processes. Nine tree species such as Triplochiton spp., Baillonella toxisperma, Pogaoleosa, Anopyxis spp. among others were considered to require urgent conservation attention. Recommendations are proposed to halt the process of decline in the biodiversity of exploited trees.展开更多
文摘Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods.To solve problems above in current network security quantitative evaluation methods,this paper verified the high relevance degree between type and exploitable score of vulnerability,proposed a new vulnerability quantitative grading method ICVSS,ICVSS can explore attack path using continuity level defined by privilege,add vulnerability type to measure indexes of exploitable metrics and use Analytic Hierarchy Process(AHP)to quantify the influence of vulnerability type on exploitable level.Compared with CVSS and WIVSS,ICVSS is proved that it can discover attack path consist of a sequence of vulnerabilities for network security situation evaluation,and has more accuracy and stability.
基金The National Key R&D Program of China under contract No.2017YFE0104400the National Basic Research Program of China under contract No.2015CB453303+2 种基金the Special Funds for Taishan Scholars Project of Shandong Provincethe AoShan Talents Cultivation Program supported by Qingdao National Laboratory for Marine Science and Technology under contract No.2017ASTCPES07the Central Public-interest Scientific Institution Basal Research Fund,CAFS under contract No.2018GH20
文摘China(herein referred as China’s mainland,and excluding Hong Kong,Macao and Taiwan)ranks as the world’s leading fishing nation,with approximately 11.1 million tons of domestic marine catch acquired in 2017.Marine fisheries resources in China are mainly exploited by its 11 coastal provinces and municipalities,and the development of fishing industry varies among them.However,few studies have examined the exploitation history of the 11 coastal provinces and municipalities.In this paper,we systematically quantified the exploitation history of marine fishery resources in China and then measured the vulnerability of the 11 coastal provinces and municipalities of China to a reduction in marine catches.Our analysis suggested that Chinese marine fisheries experienced rapid growth from the mid-1980 s to the end of the 20 th century,and this rapid increase in marine catches were mainly promoted by increased fishing effort.The total primary production required level amounted to approximately 80%of the average primary productivity in 2017,and Zhejiang,Fujian,Shandong,Hainan and Guangdong provinces were the main fishing provinces in China.By assessing three dimensions of vulnerability(exposure,sensitivity and adaptive capacity)to the impacts of a reduction in marine catches in the 11 coastal provinces and municipalities,we found that Hainan,Guangxi,Zhejiang and Fujian provinces had high or very high vulnerability,while the municipalities of Shanghai and Tianjin had low vulnerability.Identifying suitable adaptation policies and management plans based on the differences in vulnerability among coastal provinces is important in sustainable fisheries management.
文摘There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the present study, we propose a stochastic model to quantify the risk associated with the overall network using Markovian process in conjunction with Common Vulnerability Scoring System (CVSS) framework. The model we developed uses host access graph to represent the network environment. Utilizing the developed model, one can filter the large amount of information available by making a priority list of vulnerable nodes existing in the network. Once a priority list is prepared, network administrators can make software patch decisions. Gaining in depth understanding of the risk and priority level of each host helps individuals to implement decisions like deployment of security products and to design network topologies.
文摘Unregulated commercial-scale exploitation of trees is an indication of the extent of threat to various tree species. The study examined the threat status of commercially exploited trees in the forest estates of South eastern Nigeria. Specifically, it identified tree species under threat, and categorized them into threat classes, as well as determined the rate at which exploited trees were slipping into extinction. The study utilized the IUCN’s threat categorization criteria, in determining the threat status of commercially exploited trees. This study combined both secondary and primary data sources generated through Forest Inventory records, Tree Felled Analysis records and Participatory Survey. Data such as population size and density of species, level of exploitation and threat sensitive social and ecological parameters were obtained and applied against the IUCN criteria. Twenty-eight (28) trees species representing Thirty-two percent (32%) of eighty-six (86) commercially exploited trees were identified as threatened, ranging from the Vulnerable to the Critically Endangered categories. The theory of small and declining population paradigms were found to be of relevance in explaining the processes. Nine tree species such as Triplochiton spp., Baillonella toxisperma, Pogaoleosa, Anopyxis spp. among others were considered to require urgent conservation attention. Recommendations are proposed to halt the process of decline in the biodiversity of exploited trees.