期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
Analysis of Water Insulating Effect of Compound Water-Resisting Key Strata in Deep Mining 被引量:11
1
作者 FENG Mei-mei MAO Xian-biao BAI Hai-bo MIAO Xie-xing 《Journal of China University of Mining and Technology》 EI 2007年第1期1-5,共5页
The problem of water preservation in mining and the prevention of water-bursts has been one of the more important issues in deep mining. Based on the concept of water-resisting key strata, the mechanics model of the k... The problem of water preservation in mining and the prevention of water-bursts has been one of the more important issues in deep mining. Based on the concept of water-resisting key strata, the mechanics model of the key strata is established given the structural characteristics and the mechanical properties of the roof rock layers of the working face in a particular coal mine. Four other models were derived from this model by rearranging the order of the layers in the key strata. The distribution characteristics of stress, deformation, pore pressure and the flow vector of all the models are computed using the analytical module of fluid-structure interaction in the FLAC software and the corresponding risks of a water-burst are analyzed. The results indicate that the water-insulating ability of the key strata is related to the arrangement of soft and hard rocks. The water-insulating ability of the compound water-resisting key strata (CWKS) with a hard-hard-soft-hard-soft compounding order is the best under the five given simulated conditions. 展开更多
关键词 deep mining water-resisting key strata fluid-structure interaction numerical simulation mechanical analysis
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
2
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Structural motion of water-resisting key strata lying on overburden 被引量:4
3
作者 PU Hai MIAO Xie-xing +1 位作者 YAO Bang-hua TIAN Mu-jun 《Journal of China University of Mining and Technology》 EI 2008年第3期353-357,共5页
Water-preserved mining is one of the important parts of the ‘Green Mining’ technological system. The purpose of wa-ter-preserved mining is to prevent water from bursting out in coal mines and thus to protect water r... Water-preserved mining is one of the important parts of the ‘Green Mining’ technological system. The purpose of wa-ter-preserved mining is to prevent water from bursting out in coal mines and thus to protect water resources. The principle of wa-ter-resisting key strata (WKS) is proposed to establish a model capable of guiding and developing water-preserved mining technol-ogy. The experimental model of the WKS is constructed following requirements of the Data Image Correlative Method (DICM). Five experimental schemes are designed according to different combined patterns of the WKS. The water-resisting performance of the WKS is analyzed from observation of structural stability. All of them provide referential value for water-preserved mining. 展开更多
关键词 water-preserved mining water-resisting key strata (WKS) digital image correlative method (DICM) water-inrush in coal mine
下载PDF
Pore structure characteristics of the relative water-resisting layer on the top of the Ordovician in Longgu Coal Mine 被引量:3
4
作者 Rong Huren Bai Haibo 《International Journal of Mining Science and Technology》 SCIE EI 2014年第5期657-661,共5页
In order to study the permeability and water-resisting ability of the strata on the top of the Ordovician in Longgu Coal Mine, this paper tested the permeability and porosity of the strata, investigated the fracture a... In order to study the permeability and water-resisting ability of the strata on the top of the Ordovician in Longgu Coal Mine, this paper tested the permeability and porosity of the strata, investigated the fracture and pore structure features of the strata, and identified the main channels which govern the permeability and water-resisting ability of the strata. The permeability of the upper, central and lower strata shows as 2.0504 × 10^-3-2.782762× 10^-3, 4.1092 × 10^-3 -7.3387 × 10^-3 and 2.0891 ×10^-3-3.2705 × 10-3 μm^2, respectively, and porosity of that is 0.6786-0.9197%, 0.3109-0.3951% and 0.9829-1.8655%, respectively. The results indicate that: (I) the main channels of the relative water-resisting layer are the pore throats with a diameter more than 6 μm; (2) the major proportion of pore throats in the vertical flow channel and the permeability first increases and then sharply decreases; (3) the fractures occurring from the top to 20 m in depth of the strata were filled and there occurred almost no fracture under the depth of 40 m; and (4) the ratio of turning point of the main flow channel in the strata on top of Ordovician can be used to confirm the thickness of filled water-resisting lavers. 展开更多
关键词 Relative water-resisting layer Filling effect Main channels of seepage Pore structure
下载PDF
Simulation of Water-Resistance of a Clay Layer During Mining:Analysis of a Safe Water Head 被引量:10
5
作者 DONG Qing-hong CAI Rong YANG Wei-feng 《Journal of China University of Mining and Technology》 EI 2007年第3期345-348,共4页
Given previous research and prototypical geological conditions of a mining workface,we simulated fis-sure development in clay layers at the bottom of Quaternary strata and above bedrock,sand and water inrush during mi... Given previous research and prototypical geological conditions of a mining workface,we simulated fis-sure development in clay layers at the bottom of Quaternary strata and above bedrock,sand and water inrush during mining by model experiments. The results show that V-shaped fissures usually occur in the bottom clay layer at the front top of the active face and that the position of these fissures changes periodically with ground pressure intervals. These fissures occur exactly in the area where the horizontal strain is concentrated. The results also demonstrate that the permeability coefficient of the cracked clay decreases while fissures tend to close. The permeability of the cracked bottom clay layer increases rapidly after a turning point in the permeability coefficient-water head curve (K-H curve) under a certain vertical load. Under static water pressure,the permeability coefficient of cracked clay decreases when load increases. A turning point in the K-H curve showed up and can be seen as a cutoff point to de-cide water inrush under a certain load level. Under an instantaneous water head,the greatest ability of the cracked clay to avoid drastic water inflow is a little higher than that under static conditions. 展开更多
关键词 model testing water-resistance of the clay layer safety water head water and sand inrush
下载PDF
Discrimination conditions and process of water-resistant key strata 被引量:2
6
作者 WANG, Lianguo MIAO, Xiexing +2 位作者 WU, Yu SUN, Jian YANG, Hongbo 《Mining Science and Technology》 EI CAS 2010年第2期224-229,共6页
Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing pas... Water-preservation mining is one of the most important parts of the ‘Green Mining' technology system,which can realize the effective regulation of groundwater resources by controlling strata movement,changing passive prevention and governance of water disasters to active conservation and utilization of groundwater resources and thus obtaining coal and water simultaneously in mining.The concept of water-resistant key strata further enriches the content of the key stratum theory and provides a theoretical basis for water-preservation mining.In order to realize the idea of water-resistant key strata as a guideline in the design of water-preservation mining and engineering applications,the conditions for discrimination in the process of water-resistant key strata,we have presented a mechanical model,as well as its corresponding computer program,based on a large number of theoretical analyses and field measurements,as well as on a comprehensive consideration of the position,structural stability and seepage stability of key strata.Practical engineering applications indicate that this discrimination method and its corresponding computer program on water-resistant key strata are accurate and reliable and can satisfy the actual design needs of water-preservation mining and thus have instructional importance for water-preservation mining in mining areas lacking water. 展开更多
关键词 water-resistant key stratum water-preservation mining structural stability seepage stability
下载PDF
Key Points of Commercial Layers Breeding 被引量:1
7
作者 ZHANG Gui-xian 《Animal Husbandry and Feed Science》 CAS 2012年第5期204-205,225,共3页
[Objective] This paper aimed to solve the problems existing in commercial layers breeding. [Method] Key points of culture were summarized. [ Result] The timing of purchasing chickenens, comprehensive epidemic preventi... [Objective] This paper aimed to solve the problems existing in commercial layers breeding. [Method] Key points of culture were summarized. [ Result] The timing of purchasing chickenens, comprehensive epidemic prevention, decisively cleaning out predicted low-yield chickenen flock or layers, chickenens quality, control of chickenens' breeding skills, sufficient drinking water, feed quality, timely elimination of layer flock, correctly adjusting production rhythm, proper scale and other aspects should be paid attention to. [Condusion] Breeding commercial layers could get significant economic benefits through above measures. 展开更多
关键词 layer CULTURE key
下载PDF
Key structure in laminar-turbulent transition of boundary layer with streaky structures 被引量:1
8
作者 Joe Yoshikawa Yu Nishio +1 位作者 Seiichiro Izawa Yu Fukunishi 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2019年第1期32-35,I0005,共5页
A numerical simulation is performed to find out a key vortical structure in the laminar-turbulent transition. A low-speed streak is generated inside a laminar boundary layer using an isolated cuboid roughness, aimed a... A numerical simulation is performed to find out a key vortical structure in the laminar-turbulent transition. A low-speed streak is generated inside a laminar boundary layer using an isolated cuboid roughness, aimed at providing an environment unstable to outer disturbances. Then, a short duration jet is issued into the boundary layer. When the jet velocity is low, some vortices appear in the boundary layer, but the transition of the boundary layer does not take place.However, when the jet velocity exceeds a certain threshold, two vortices newly appear above the elongated legs of a V-shaped vortex and only one of them is stretched and survives. After that,vortices are generated one after another around the survived one. By comparing the decayed and the survived vortices, it is found that the difference in their heights is the key characteristic which leads to the transition. 展开更多
关键词 Turbulent ONSET key vortical STRUCTURE Laminar-turbulent transition Boundary layer Streaky STRUCTURES Short DURATION jet Numerical simulation
下载PDF
Physical-Layer Key Generation Based on Multipath Channel Diversity Using Dynamic Metasurface Antennas
9
作者 Zheng Wan Yangming Lou +4 位作者 Xiaoming Xu Jinmei Yang Wenyu Jiang Kaizhi Huang Liang Jin 《China Communications》 SCIE CSCD 2023年第4期153-166,共14页
Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-... Physical layer key generation(PKG)technology leverages the reciprocal channel randomness to generate the shared secret keys.The low secret key capacity of the existing PKG schemes is due to the reduction in degree-of-freedom from multipath fading channels to multipath combined channels.To improve the wireless key generation rate,we propose a multipath channel diversity-based PKG scheme.Assisted by dynamic metasurface antennas(DMA),a two-stage multipath channel parameter estimation algorithm is proposed to efficiently realize super-resolution multipath parameter estimation.The proposed algorithm first estimates the angle of arrival(AOA)based on the reconfigurable radiation pattern of DMA,and then utilizes the results to design the training beamforming and receive beamforming to improve the estimation accuracy of the path gain.After multipath separation and parameter estimation,multi-dimensional independent path gains are utilized for generating secret keys.Finally,we analyze the security and complexity of the proposed scheme and give an upper bound on the secret key capacity in the high signal-to-noise ratio(SNR)region.The simulation results demonstrate that the proposed scheme can greatly improve the secret key capacity compared with the existing schemes. 展开更多
关键词 physical layer security multipath channel diversity physical layer key generation dynamic metasurface antennas
下载PDF
Evolution of Key Technologies for WiMAX Physical Layer
10
作者 Liu Qiaoyan Yu Qiuxing (Xi’an R&D Department of CDMA Research Institute, Corporation,Xi’an 710065,China) 《ZTE Communications》 2007年第3期15-19,共5页
Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient a... Despite the rapid development in Worldwide Interoperability for Microwave Access (WiMAX) technologies,key technologies for the Physical Layer (PHY) still need to be further improved so as to achieve highly efficient and reliable communication performance,as well as to support a mobile environment with a higher transmisison rate. As an amendment to IEEE 802.16d (for fixed broadband wireless access systems),IEEE 802.16e (for mobile broadband wireless access systems) introduces the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO) technologies into the PHY,doubling the transmission rate while supporting a certain degree of mobility. In the future,more advanced Air Interface (AI) technology is to be applied in the IEEE 802.16m standard. 展开更多
关键词 WIMAX ACCESS Evolution of key Technologies for WiMAX Physical layer HARQ
下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
11
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC key MAC layer Technologies of Cognitive Radio Network RADIO
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
12
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4
13
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
下载PDF
Secret Key Generation Based on Two-Way Randomness for TDD-SISO System 被引量:9
14
作者 Shengjun Zhang Liang Jin +1 位作者 Yangming Lou Zhou Zhong 《China Communications》 SCIE CSCD 2018年第7期202-216,共15页
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi... A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test. 展开更多
关键词 secret key generation physical layer security information reconciliation information theory
下载PDF
Fast Secret Key Generation Based on Dynamic Private Pilot from Static Wireless Channels 被引量:4
15
作者 Yu Huang Liang Jin +2 位作者 Hongquan Wei Zhou Zhong Shengjun Zhang 《China Communications》 SCIE CSCD 2018年第11期171-183,共13页
In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-m... In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-middle(MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks. 展开更多
关键词 dynamic private pilot MITMattacks secret key generation wireless chan-nels physical layer security
下载PDF
Power Allocation Strategy for Secret Key Generation Method in Wireless Communications 被引量:1
16
作者 Bin Zhang Muhammad Waqas +2 位作者 Shanshan Tu Syed Mudassir Hussain Sadaqat Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2021年第8期2179-2188,共10页
Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wirele... Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR. 展开更多
关键词 Secret key generation rate power allocation physical layer wireless communication
下载PDF
A Way to Set up Security Layer over Internet
17
作者 Xiangyi Hu Guifen Zhao Guanning Xu 《Journal of Computer and Communications》 2015年第5期174-181,共8页
A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange prot... A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system. 展开更多
关键词 Security layer VERTICAL AUTHENTICATION Combined SECRET key Credible Network Online AUTHENTICATION OFFLINE AUTHENTICATION
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
18
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) key Risk Indicator (KRI) layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
Relationship between water inrush from coal seam floors and main roof weighting 被引量:4
19
作者 Sun Jian Hu Yang Zhao Guangming 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2017年第5期873-881,共9页
A water-resistant key strata model of a goaf floor prior to main roof weighting was developed to explore the relationship between water inrush from the floor and main roof weighting. The stress distribution,broken cha... A water-resistant key strata model of a goaf floor prior to main roof weighting was developed to explore the relationship between water inrush from the floor and main roof weighting. The stress distribution,broken characteristics, and the risk area for water inrush of the water-resistant key strata were analysed using elastic thin plate theory. The formula of the maximum water pressure tolerated by the waterresistant key strata was deduced. The effects of the caved load of the goaf, the goaf size prior to main roof weighting, the advancing distance of the workface or weighting step, and the thickness of the waterresistant key strata on the breaking and instability of the water-resistant key strata were analysed.The results indicate that the water inrush from the floor can be predicted and prevented by controlling the initial or periodic weighting step with measures such as artificial forced caving, thus achieving safe mining conditions above confined aquifers. The findings provide an important theoretical basis for determining water inrush from the floor when mining above confined aquifers. 展开更多
关键词 FLOOR WATER inrush Main ROOF weighting water-resistant key STRATA FORCED CAVING
下载PDF
An Efficient Impersonation Attack Detection Method in Fog Computing 被引量:3
20
作者 Jialin Wan Muhammad Waqas +4 位作者 Shanshan Tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman Muhammad Hanif 《Computers, Materials & Continua》 SCIE EI 2021年第7期267-281,共15页
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t... Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER). 展开更多
关键词 Fog computing double Sarsa attack detection physical layer key security
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部