In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o...In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.展开更多
在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低...在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。展开更多
本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推...本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推出即受到业界广泛关注。展开更多
Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功...Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功能的全方位端点安全解决方案。这款解决方案为个人电脑提供卓越的安全保护,而且无需部署和管理多个代理程序,从而降低了总体拥有成本。展开更多
互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间...互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、全盘加密以及带有端口保护功能的媒介加密功能。这款称为Check Point Endpoint Security R70的方案为企业提供功能更强、更为精简的操作界面以及额外的工具。展开更多
全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、...全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、展开更多
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ...Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.展开更多
Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies.Blockchain achieves security by saving the information of one block in the next block.Changing the inform...Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies.Blockchain achieves security by saving the information of one block in the next block.Changing the information of one block will require changes to all the next block in order for that change to take effect.Which makes it unfeasible for such an attack to happen.However,the structure of how blockchain works makes the last block always vulnerable for attacks,given that its information is not saved yet in any block.This allows malicious node to change the information of the last block and generate a new block and broadcast it to the network.Given that the nodes always follow the longer chain wins rule,the malicious node will win given that it has the longest chain in the network.This paper suggests a solution to this issue by making the nodes send consistency check messages before broadcasting a block.If the nodes manage to successfully verify that the node that generated a new block hasn’t tampered with the blockchain than that block will be broadcasted.The results of the simulation show suggested protocol provided better security compared to the regular blockchain.展开更多
文摘In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.
文摘在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。
文摘本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推出即受到业界广泛关注。
文摘Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功能的全方位端点安全解决方案。这款解决方案为个人电脑提供卓越的安全保护,而且无需部署和管理多个代理程序,从而降低了总体拥有成本。
文摘互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、全盘加密以及带有端口保护功能的媒介加密功能。这款称为Check Point Endpoint Security R70的方案为企业提供功能更强、更为精简的操作界面以及额外的工具。
基金supported by National Natural Science Foundation of China under Grant No. 61003079
文摘Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.
基金supported by research fund of Chungnam National University.
文摘Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies.Blockchain achieves security by saving the information of one block in the next block.Changing the information of one block will require changes to all the next block in order for that change to take effect.Which makes it unfeasible for such an attack to happen.However,the structure of how blockchain works makes the last block always vulnerable for attacks,given that its information is not saved yet in any block.This allows malicious node to change the information of the last block and generate a new block and broadcast it to the network.Given that the nodes always follow the longer chain wins rule,the malicious node will win given that it has the longest chain in the network.This paper suggests a solution to this issue by making the nodes send consistency check messages before broadcasting a block.If the nodes manage to successfully verify that the node that generated a new block hasn’t tampered with the blockchain than that block will be broadcasted.The results of the simulation show suggested protocol provided better security compared to the regular blockchain.