期刊文献+
共找到1,667篇文章
< 1 2 84 >
每页显示 20 50 100
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
1
作者 Hoon Ko Marek R.Ogiela 《Computers, Materials & Continua》 SCIE EI 2025年第1期259-278,共20页
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an... This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems. 展开更多
关键词 Digitalmedical content medical diagnostic visualization security analysis generativeAI blockchain VULNERABILITY pattern recognition
下载PDF
Impacts of multi-scenario land use change on ecosystem services and ecological security pattern: A case study of the Yellow River Delta
2
作者 XueHua Cen Hua Zhang 《Research in Cold and Arid Regions》 CSCD 2024年第1期30-44,共15页
The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the regio... The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development. 展开更多
关键词 Land use change Multi-scenario simulation Ecosystem services Ecological security pattern The Yellow River Delta Circuit theory
下载PDF
Strategies and Paths for Constructing Rural Landscape Ecological Security Pattern in the Context of Rural Revitalization
3
作者 SHEN Kejian ZHANG Hong +1 位作者 CHEN Binqing LI Guoqing 《Journal of Landscape Research》 2024年第5期50-55,共6页
It is one of the fundamental research contents of rural revitalization by constructing a ecological security pattern of rural landscape,providing important basis for scientifically formulating rural spatial planning a... It is one of the fundamental research contents of rural revitalization by constructing a ecological security pattern of rural landscape,providing important basis for scientifically formulating rural spatial planning and sustainable rural development.The research on ecological security patterns of landscape at home and abroad is mainly focused on urban areas.In the context of rural revitalization,the research on strategies and paths for constructing the ecological security pattern of rural landscapes aims to provide important references for the overall planning and design of rural areas and the optimization of rural resource allocation.Using 3S(GPS,RS,GIS)technology methods,this paper systematically analyzes and elaborates on the construction strategies and paths of rural water ecological security pattern,rural biological protection security pattern,rural geological disaster security pattern,and local cultural landscape security pattern.Through the comprehensive superposition of the patterns,a comprehensive ecological security pattern of rural landscape is finally constructed.In the process of constructing and improving the ecological security pattern of rural landscape,emphasis is placed on top-level design,long-term planning,multi-party participation,mechanism improvement,technological innovation,and the strategy of“integrating knowledge with action”. 展开更多
关键词 Rural revitalization Landscape ecological security pattern Rural planning Path research
下载PDF
Using ecosystem service supply and ecosystem sensitivity to identify landscape ecology security patterns in the Lanzhou-Xining urban agglomeration, China 被引量:8
4
作者 TONG Hua-li SHI Pei-ji 《Journal of Mountain Science》 SCIE CSCD 2020年第11期2758-2773,共16页
The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecolo... The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region. 展开更多
关键词 Ecological security pattern Ecosystem service Ecosystem sensitivity Ecological source Ecological corridor Urban agglomeration
下载PDF
Ecological Planning and Design of Waterfront in Xianghe County from the Perspective of Landscape Security Pattern 被引量:3
5
作者 SHU Ping PAN Yunsheng WANG Lijun 《Journal of Landscape Research》 2013年第6期1-4,6,共5页
Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study ... Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape. 展开更多
关键词 LANDSCAPE security pattern WATERFRONT LANDSCAPE ECOLOGICAL PLANNING
下载PDF
Security Engineering of SOA Applications Via Reliability Patterns
6
作者 Luigi Coppolino Luigi Romano Valerio Vianello 《Journal of Software Engineering and Applications》 2011年第1期1-8,共8页
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel... Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services. 展开更多
关键词 RELIABILITY of security SERVICES RELIABILITY patterns WORKFLOW Systems SOA APPLICATIONS Web SERVICES Technology
下载PDF
Optimization of Rural Settlement Distributions Based On the Ecological Security Pattern: A Case Study of Da’an City in Jilin Province of China 被引量:6
7
作者 YIN Jingbo LI Hong +1 位作者 WANG Dongyan LIU Shuhan 《Chinese Geographical Science》 SCIE CSCD 2020年第5期824-838,共15页
Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so ... Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement. 展开更多
关键词 ecologically fragile regions ecological security pattern(Esp) rural settlements Da’an City
下载PDF
Territorial Ecological Restoration with a High-carbon Storage Focus in the Beibu Gulf Urban Agglomeration of China:Insights from Carbon Metabolism Spatial Security Patterns
8
作者 QIN Menglin LIU Yuting +5 位作者 TAN Qianxi ZHU Ziming WU Xinyu JIANG Hongbo LI Hang SHI Qianqian 《Chinese Geographical Science》 2025年第1期73-91,共19页
This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking an... This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking and neutrality goals.This research ana-lyzes the spatial characteristics of carbon metabolism from 2000 to 2020 and uses models to identify stable carbon sink areas,positive carbon flow corridors,and carbon sequestration nodes.The goal is to construct a carbon metabolism spatial security pattern(CMSSP)and propose territorial ecological restoration strategies under different development demand scenarios.The results show the following:1)in 2020,the study area’s carbon sink decreased by 8.29×10^(4) t C/yr compared with that in 2010 and by 10.83×10^(4) t C/yr compared with that in 2000.High-carbon sinks were found mainly in mountainous areas,whereas low-carbon sinks are concentrated in urban con-struction land,rural residential areas,and land margins.2)From 2000 to 2020,the spatial security pattern of carbon metabolism tended to be‘high in the middle of the east and west and low in the gulf.’In 2000,2010,and 2020,16 stable carbon sinks were identified.The carbon energy flow density in Guangxi was greater than that in Guangdong and Hainan,with positive carbon flow corridors located primarily in Guangxi and Guangdong.The number of carbon sequestration nodes remained stable at approximately 15,mainly in Guangxi and Hainan.3)Scenario simulations revealed that under the Nature-based mild restoration scenario,the carbon sink rate will reach 611.85×10^(4) t C/yr by 2030 and increase to 612.45×10^(4) t C/yr by 2060,with stable carbon sinks increasing to 18.In the restora-tion scenario based on Anti-globalization,the carbon sink will decrease from 610.24×10^(4) t C/yr in 2030 to 605.19×10^(4) t C/yr in 2060,with the disappearance of some positive carbon flow corridors and stable carbon sinks.Under the Human-based sustainable restoration scenario,the carbon sink area will decrease from 607.00×10^(4) t C/yr in 2030 to 596.39×10^(4) t C/yr in 2060,with carbon sink areas frag-menting and positive carbon flow corridors becoming less dense.4)On the basis of the current and predicted CMSSPs,this study ex-plores spatial ecological restoration strategies for high-carbon storage areas in bay urban agglomerations at four levels:the land control region,urban agglomeration structure system,carbon sink structure and bay structure control region. 展开更多
关键词 carbon metabolism spatial security pattern(CMSsp) territorial ecological restoration carbon sink carbon storage capacity Beibu Gulf Urban Agglomeration China
下载PDF
Groundwork for True XML-based Security Pattern Languages
9
作者 TAWFIQ S.M.Barhoom 张申生 《Journal of Donghua University(English Edition)》 EI CAS 2005年第1期120-123,共4页
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ... A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language. 展开更多
关键词 security pattern XML security security patterns language template.
下载PDF
Effects of Different Cultivation Patterns of Wheat on Population Structure of Puccinia striiformis West.f. sp. tritici
10
作者 Li Jinbin Liu Lin +7 位作者 Yang Jing Lan Mingqing Chen Mengqi Yang Jincheng Chen Xiangdong Li Yueqiu Zhu Youyong Li Chengyun 《Plant Diseases and Pests》 CAS 2014年第2期22-24,34,共4页
The paper was to study the effects of different cultivation patterns( mix cultivation and monocultivation) of wheat on population structure of Puccinia striiformis West. f. sp. tritici in the fields. Five race-specifi... The paper was to study the effects of different cultivation patterns( mix cultivation and monocultivation) of wheat on population structure of Puccinia striiformis West. f. sp. tritici in the fields. Five race-specific-markers( CY32,CY31,CY29,CY23 and Shuiyuan pathotype) were used to survey 113 infected samples collected from two cultivation patterns. The results indicated that frequency of race-specific-markers under monocultivation was higher than that under mix cultivation; the dominant race-specific-markers were CY32 and CY29 under monocultivation,and the frequency of detection were 81. 5% and 78. 5%,respectively. The dominant race-specific-markers were CY29 and Shuiyuan pathotype under mix cultivation,and the frequency of detection are 41. 7% and 18. 8%,respectively.Several race-specific-markers were detected in single infected leaf,and 41. 7% of infected single leaf were detected with more than two race-specific-markers,58. 3% of infected single leaf were detected with one race-specific-marker under mix cultivation pattern,while there were 75. 0% infected leaves with more than two race-specific-markers and 25. 0% infected single leaf detected with one race-specific-marker under monocultivation pattern. The results indicated that mix cultivation pattern of wheat can reduce races on single leaf,affect the distribution of races in infected leaves,and suppress the occurrence frequency of dominant races of P. striiformis in the fields significantly,subsequently reduced severity and prevalence of the disease. 展开更多
关键词 Puccinia striiformis f.sp.tritici RACE Molecular detection Race-specific-marker Cultivation pattern
下载PDF
Human Security, Poverty Pattern and Social Order in Igbo Rural Communities of Contemporary Nigeria
11
作者 Iwundu Anthony Onyekwere 《Journalism and Mass Communication》 2017年第8期472-479,共8页
The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty,... The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled. 展开更多
关键词 human security poverty pattern social order rural community ASSETS integration
下载PDF
Spring Security中设计模式的运用浅析
12
作者 覃茏伟 兰全祥 《大众科技》 2023年第9期1-5,共5页
Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、... Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、责任链模式、模板方法模式的运用,对上述设计模式的概念、基本原理、作用等进行描述,分析SpringSecurity中关键类库在设计模式中承担的作用及执行流程,为开发人员提供一定的学习参考。 展开更多
关键词 spring security 设计模式 认证 授权
下载PDF
基于CiteSpace的生态安全格局发展演变热点研究
13
作者 吕静 朱家慧 《建筑与文化》 2024年第9期265-267,共3页
文章以CNKI数据库及WOS中SSCI数据库的2515篇文献为研究对象,通过CiteSpace可视化计量软件对其发展演变进行分析。研究发现,国内外关于生态安全格局的研究始于1998年,一直呈逐年递增的趋势,经历了低增长发展、波动型发展、高增长发展、... 文章以CNKI数据库及WOS中SSCI数据库的2515篇文献为研究对象,通过CiteSpace可视化计量软件对其发展演变进行分析。研究发现,国内外关于生态安全格局的研究始于1998年,一直呈逐年递增的趋势,经历了低增长发展、波动型发展、高增长发展、平缓型发展四个阶段;研究热点由早期生态安全转为生态廊道、生态源地、最小累积阻力模型以及电路理论方面等;未来生态安全格局的研究可以从多角度入手,在现有基础上进行创新是生态安全格局研究的重要推进方向。 展开更多
关键词 生态安全格局 CITEspACE 发展演变 研究热点
下载PDF
Impacts of climate change on water quantity, water salinity, food security, and socioeconomy in Egypt 被引量:2
14
作者 Mohie El Din Mohamed Omar Ahmed Moustafa Ahmed Moussa Reinhard Hinkelmann 《Water Science and Engineering》 EI CAS CSCD 2021年第1期17-27,共11页
Climate change might have direct impacts on water quantity in Egypt and lead to indirect effects on Mediterranean saltwater intrusion to groundwater,which exposes agriculture to vulnerability.This study investigated i... Climate change might have direct impacts on water quantity in Egypt and lead to indirect effects on Mediterranean saltwater intrusion to groundwater,which exposes agriculture to vulnerability.This study investigated impacts of climate change on agriculture,with particular regard to food security and socioeconomy,and quantified the effectiveness of cropping pattern adaptation measures by integrating three mathematical models.The BlueM model was used for hydrological simulations of Nasser Lake under flooding scenarios to predict the water supply from the High Aswan Dam.The water and salinity balance(WB-SAL)model was adopted to estimate the water salinity in the Nile Delta.The simulated results from the BlueM and WB-SAL models were integrated with the agricultural simulation model for Egypt(ASME)to project cropping patterns,food security,and socioeconomy throughout the country.The results showed that future climate change will directly affect the total crop area;crop areas for 13 crop types;the self-sufficiency of wheat,rice,cereal,and maize supplies;and socioeconomic indicators.The proposed cropping pattern adaptation measures focus on fixing the crop areas of rice and orchards and providing half of the population with lentils,maize,onion,vegetables,milk,and meat.The adaptation measures have the potential to promote food security without causing deterioration of the socioeconomic situation.However,water availability has much more significant effects on food security and socioeconomy than cropping pattern adaptation measures do.Accordingly,the country should rationalize water use efficiency and increase water supply.©2021 Hohai University.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/). 展开更多
关键词 Climate change Water quantity SALINITY Cropping pattern adaptation measures Food security Socioeconomy
下载PDF
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior 被引量:1
15
作者 Faisal Alghayadh Debatosh Debnath 《Advances in Internet of Things》 2021年第1期10-25,共16页
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ... With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique. 展开更多
关键词 Anomaly Detection Smart Home Systems Behavioral patterns security Threats
下载PDF
Privacy Protection through Appropriate Interaction Patterns
16
作者 高枫 何泾沙 +1 位作者 吕欣 张峰 《China Communications》 SCIE CSCD 2011年第4期141-152,共12页
In network environments,before meaningful interactions can begin,trust may need to be established between two interactive entities in which an entity may ask the other to provide some information involving privacy.Con... In network environments,before meaningful interactions can begin,trust may need to be established between two interactive entities in which an entity may ask the other to provide some information involving privacy.Consequently,privacy protection and trust establishment become important in network interactions.In order to protect privacy while facilitating effective interactions,we propose a trust-based privacy protection method.Our main contributions in this paper are as follows:(1)We introduce a novel concept of k-sensitive privacy as a measure to assess the potential threat of inferring privacy;(2)According to trust and k-sensitive privacy evaluation,our proposed method can choose appropriate interaction patterns with lower degree of inferring privacy threat;(3)By considering interaction patterns for privacy protection,our proposed method can overcome the shortcomings of some current privacy protection methods which may result in low interaction success rate.Simulation results show that our method can achieve effective interactions with less privacy loss. 展开更多
关键词 network security privacy protection TRUST interaction pattern network interaction
下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
17
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic Design Flaws Components Integration Flaws E-Commerce System Assurance & security Model Based Design Business Logic Attacks Attack pattern
下载PDF
On the Pattern, Motivation and Prospects of China-US Nonproliferation Cooperation
18
作者 Guo Xiaobing 《Contemporary International Relations》 2018年第1期79-102,共24页
Nonproliferation cooperation has always been a bright spot in China-US security cooperation for over more than a decade. China and the U.S. should timely adjust the focus of their nonproliferation cooperation on a mor... Nonproliferation cooperation has always been a bright spot in China-US security cooperation for over more than a decade. China and the U.S. should timely adjust the focus of their nonproliferation cooperation on a more equal basis, expanding common interests and exploring new patterns for cooperation so as to create a model for the two countries to join hands in global governance and maintenance of regional order. 展开更多
关键词 NONPROLIFERATION nuclear security export control China-US cooperation pattern
下载PDF
Spatial Pattern and Distribution of Crime in Suleja Lga, Niger State, Nigeria
19
作者 Isaac Utenwojo Ocholi Paul Ojochenemi Abuh +1 位作者 Ademu Samuel Aminu Musa 《Journal of Geographic Information System》 2023年第4期379-390,共12页
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ... The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities. 展开更多
关键词 Urban security spatial pattern CRIME GIS HOTspOT INsecurity
下载PDF
Perimeter Security System Based on Ultra-Weak Fiber Bragg Grating Array
20
作者 Zhihui Luo Hao Xiang +1 位作者 Yu Zhang Bing Xu 《Optics and Photonics Journal》 2022年第6期156-169,共14页
A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed ba... A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance. 展开更多
关键词 Perimeter security Ultra-Weak Fiber Bragg Grating Vibration Sensor pattern Recognition
下载PDF
上一页 1 2 84 下一页 到第
使用帮助 返回顶部