Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho...Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.展开更多
The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arc...The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all.展开更多
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica...Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.展开更多
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi...This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.展开更多
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai...Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios.展开更多
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe...Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.展开更多
Based on PSR framework method, the land ecological security evaluation index system of 16 cities of Anhui Province was constructed. The land ecological security value of subsystem in Anhui Province from 2000 to 2011 w...Based on PSR framework method, the land ecological security evaluation index system of 16 cities of Anhui Province was constructed. The land ecological security value of subsystem in Anhui Province from 2000 to 2011 was calculated using the index weight which was determined by the entropy weight method, and land ecological security trend from 2012 to 2017 was forecasted using GM (1,1) model. The results indicated that, the land ecological security index in Anhui Province from 2000 to 2017 was rising on the whole, with the average value increasing from 0.442 in 2000 to 0.450 in 2017, and there was a huge difference among cities; at the same time, the state index and response index of each subsystem of land ecological security also rose. GM ( 1, 1 ) model had high simulation precision and was able to predict the land ecological security level and the de- velopment trend of each subsystem of Anhui Province from 2012 to 2017. The main factors that influenced the land ecological security of Anhui Prov- ince included per capita farmland area, population density, natural growth rate of population, urbanization level, soil coordination degree, agricultur- al mechanization degree, and the area proportion of nature reserve, which are the focus of land ecological security regulation in the future.展开更多
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt...This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches.展开更多
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con...At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.展开更多
System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Base...System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security.展开更多
Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant pene...Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA).展开更多
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose...The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.展开更多
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand...Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.展开更多
Since the 1970s, according to the international pension system reform trend for old-age social security system, no single institutional arrangement can ensure the functions of endowment security system to achieve the ...Since the 1970s, according to the international pension system reform trend for old-age social security system, no single institutional arrangement can ensure the functions of endowment security system to achieve the optimal.Therefore,how to based on the present situation of development, and to accurately, thus promote the resources integration, comprehensive build multi-level old-age security system, has important policy and practice significance.展开更多
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The...In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attenti...Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attention.In this study,an integrated dynamic simulation model was constructed using the system dynamic method,and it was used to evaluate the FES in China from 1999 to 2014.A scenario analysis was then used to evaluate the changes in the FES under five forestry policy scenarios for the 2015–2050 period,including the baseline,afforestation policy,harvesting policies,management policy,investment policy,and a policy mix.The results showed that the evaluation values of the FES increased during the period from 1999 to 2002,the period from 2004 to 2010 and the year 2014,and they decreased in 2003 and during the period from 2011 to 2013.During the 2015–2050 simulation period,the FES improved continuously.In particular,China would enter a new stage when the economic systems,social systems and ecosystems were in harmony after 2040.To improve the FES and the current status of the FES,a scenario analysis showed the most suitable scenario to be Scenario 5 from 2015 to 2020 and Scenario 2 from 2021 to 2050.To relieve pressure,the most suitable scenario would be Scenario 5 from 2015 to 2040 and from 2046 to 2050,and the most suitable scenario would be Scenario 4 for 2041–2045.A policy mix(Scenario 5)would be most efficient under current conditions,while the effects of all the benefits of the forestry policies would weaken over the long term.The integrated method can be regarded as a decision support tool to help policy makers understand FES and promulgate a reasonable forestry policy.展开更多
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer fro...Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. A new approach is proposed in this paper that applies principles from control theory to enforce constraints on security threats thereby extending techniques used in system safety engineering. It is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the air transportation system. Insights are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS).展开更多
文摘Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.
基金supported by the Chinese Polar Environment Comprehensive Investigation and Assessment Program(Grant no.CHINARE2016-04-05-01)
文摘The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all.
基金National Natural Science Foundation of China, No.40371003 Ministry of Education of China, No.01158 Master Research Project of Shaanxi Normal University
文摘Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv.
基金supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900)National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008)
文摘This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.
文摘Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios.
基金supported by the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps,under grants No.2020DB005 and No.2017DB005supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions fund.
文摘Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.
文摘Based on PSR framework method, the land ecological security evaluation index system of 16 cities of Anhui Province was constructed. The land ecological security value of subsystem in Anhui Province from 2000 to 2011 was calculated using the index weight which was determined by the entropy weight method, and land ecological security trend from 2012 to 2017 was forecasted using GM (1,1) model. The results indicated that, the land ecological security index in Anhui Province from 2000 to 2017 was rising on the whole, with the average value increasing from 0.442 in 2000 to 0.450 in 2017, and there was a huge difference among cities; at the same time, the state index and response index of each subsystem of land ecological security also rose. GM ( 1, 1 ) model had high simulation precision and was able to predict the land ecological security level and the de- velopment trend of each subsystem of Anhui Province from 2012 to 2017. The main factors that influenced the land ecological security of Anhui Prov- ince included per capita farmland area, population density, natural growth rate of population, urbanization level, soil coordination degree, agricultur- al mechanization degree, and the area proportion of nature reserve, which are the focus of land ecological security regulation in the future.
基金supported in part by the National Natural Science Foundation of China(61873050)the Fundamental Research Funds for the Central Universities(N180405022,N2004010)+1 种基金the Research Fund of State Key Laboratory of Synthetical Automation for Process Industries(2018ZCX14)Liaoning Revitalization Talents Program(XLYC1907088)。
文摘This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches.
基金Acknowledgements This work was supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) and National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008).
文摘At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.
基金supported by the National Natural Science Foundation of China(Grant nos.70873119 and 40871253)Chinese Academy of Sciences Knowledge Innovation Program(Grant no.066U0401SZ)
文摘System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security.
文摘Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA).
基金Supported by National Natural Science Foundation of China (No.50595413)Special Fund of the National Fundamental Research of China(No.2004CB217904)+4 种基金US EPRI under Agreement EP-P29464/C9966Foundation for the Author of National Excellent Doctoral Disserta-tion (No.200439)Key Project of Ministry of Education of China(No.105047)Program for New Century Excellent Talents in University,Fok Ying Tung Education Foundation (No.104019)Innovation Fund of Tianjin Municipal (2006-09)
文摘The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.
基金Supported by Project of National Key Technology R & D (2012BAC16B04)
文摘Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.
文摘Since the 1970s, according to the international pension system reform trend for old-age social security system, no single institutional arrangement can ensure the functions of endowment security system to achieve the optimal.Therefore,how to based on the present situation of development, and to accurately, thus promote the resources integration, comprehensive build multi-level old-age security system, has important policy and practice significance.
文摘In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
基金supported by the National Social Science Foundation of China(Grant No.15BGL130)the Social Science Youth Foundation of Beijing Municipal(Grant No.15JGC148)+1 种基金the Education Ministry of China(Grant No.13YJCZH131)the China’s State Forestry Administration(Grant No.ZDWT-2014-17)
文摘Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attention.In this study,an integrated dynamic simulation model was constructed using the system dynamic method,and it was used to evaluate the FES in China from 1999 to 2014.A scenario analysis was then used to evaluate the changes in the FES under five forestry policy scenarios for the 2015–2050 period,including the baseline,afforestation policy,harvesting policies,management policy,investment policy,and a policy mix.The results showed that the evaluation values of the FES increased during the period from 1999 to 2002,the period from 2004 to 2010 and the year 2014,and they decreased in 2003 and during the period from 2011 to 2013.During the 2015–2050 simulation period,the FES improved continuously.In particular,China would enter a new stage when the economic systems,social systems and ecosystems were in harmony after 2040.To improve the FES and the current status of the FES,a scenario analysis showed the most suitable scenario to be Scenario 5 from 2015 to 2020 and Scenario 2 from 2021 to 2050.To relieve pressure,the most suitable scenario would be Scenario 5 from 2015 to 2040 and from 2046 to 2050,and the most suitable scenario would be Scenario 4 for 2041–2045.A policy mix(Scenario 5)would be most efficient under current conditions,while the effects of all the benefits of the forestry policies would weaken over the long term.The integrated method can be regarded as a decision support tool to help policy makers understand FES and promulgate a reasonable forestry policy.
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. A new approach is proposed in this paper that applies principles from control theory to enforce constraints on security threats thereby extending techniques used in system safety engineering. It is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the air transportation system. Insights are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS).