期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
New NATO: Special Features and Impact on European Security
1
作者 刘海如 《Contemporary International Relations》 1999年第5期1-9,共9页
The North Atlantic Treaty Organization(NATO) has made two major strate-gic readjustments in the post-Cold War years to shake off the awkward posi-tion when its raison d’etre was called into doubt. At the 1991 Rome Su... The North Atlantic Treaty Organization(NATO) has made two major strate-gic readjustments in the post-Cold War years to shake off the awkward posi-tion when its raison d’etre was called into doubt. At the 1991 Rome Summit, an"All-dimensional defense strategy" was put forth with conflict prevention andcrisis management as its core mission. Preparations for the second strategic read-justment began in 1997 and the concept of a 21st century-oriented new strategywas declared at the Washington Summit last April. 展开更多
关键词 New NATO Special features and Impact on European security
下载PDF
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
2
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq 《Computers, Materials & Continua》 SCIE EI 2024年第9期3655-3683,共29页
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential... The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments. 展开更多
关键词 Machine learning Internet of Things(IoT) DoS DDoS CYBERsecurity intrusion prevention network security feature optimization sustainability
下载PDF
Leading Features of the International Security Landscape in 2008
3
作者 XIONG GUANGKAI 《Beijing Review》 2009年第4期10-11,共2页
The international security situation in the past year on the whole retained the basic posture of peace and stability, but unstable and uncertain elements cast a growing shadow
关键词 In security Leading features of the International security Landscape in 2008
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部