期刊文献+
共找到1,387篇文章
< 1 2 70 >
每页显示 20 50 100
Investigating the Effect of Relative Width on Momentum Transfer between Main Channel and Floodplain in Rough Rectangular Compound Channel Sunder Varius Relative Depth Condition 被引量:5
1
作者 Shima Bahadori Mehdi Behdarvandi Askar 《Open Journal of Geology》 2016年第4期225-231,共7页
Compound section is referred to a section the surface of which is made of several sub-sections with different flow characteristics. The difference in the hydraulic and geometry characteristics causes a complexity in f... Compound section is referred to a section the surface of which is made of several sub-sections with different flow characteristics. The difference in the hydraulic and geometry characteristics causes a complexity in flow hydraulic and creates an interaction between the main channel and floodplains, resulting in an apparent shear stress and a transverse momentum transfer. The amount of such a stress plays an important role in many river engineering measures [1]. Due to the flow complexity, the common approximate analytical methods are not enough to identify the flow profile. The FLOW3D Software with its great features in three-dimensional analysis of flow field is used as a tool to investigate the shear stress in a direct symmetrical compound rectangular channel. After the simulation of models, it is found that an increase in the relative width and relative depth parameters decreases the percentage of apparent shear stress and an increase in the relative roughness causes it to be increased [2]. 展开更多
关键词 Compound Channel Momentum Transfer Relative Roughness Relative depth Relative width
下载PDF
Crack elongation and its width of large depth reinforced concrete beams 被引量:2
2
作者 管俊峰 赵顺波 黄承逵 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第5期631-635,共5页
In order to meet the requirement of structural inspection,the crack spacing and crack width at various heights in the tensile zone of six large depth reinforced concrete beams were measured under several loading level... In order to meet the requirement of structural inspection,the crack spacing and crack width at various heights in the tensile zone of six large depth reinforced concrete beams were measured under several loading levels of serviceability state.The effects of the depth of normal section beams on the crack spacing and crack width were analyzed,and the modified model is proposed for calculating the average crack spacing by thinking about the depth of normal section,the reinforcement arrangement and the effective reinforcement ratio.The relationships of crack widths at any position in the tensile zone and at the reinforcement level on the side surface of beam were studied.By theoretical and statistical analysis,a method is proposed to calculate the ratios of crack widths between any position and the reinforcement level on the side surface of large depth reinforced concrete beams. 展开更多
关键词 reinforced concrete beam large depth of normal section crack elongation average crack spacing ratio of crack width
下载PDF
Effects of process parameters on the depth-to-width ratio of flux-cored wire underwater wet welding 被引量:3
3
作者 韩焱飞 郭宁 +2 位作者 王芳 袁新 冯吉才 《China Welding》 EI CAS 2013年第1期35-40,共6页
The effects of process parameters on the depth-to-width ratio (D/W) of flux-cored wire underwater wet welding with a certain type of homemade .flux-cored wire are studied. It is found that the welding .speed, wire f... The effects of process parameters on the depth-to-width ratio (D/W) of flux-cored wire underwater wet welding with a certain type of homemade .flux-cored wire are studied. It is found that the welding .speed, wire feeding speed and torch oscillating amplitude hare significant effects on the dopth-to-width ratio (D/W) of welds. The D/W ratio of welds increases significantly with the increase of welding speed without the oscillating of welding torch. It increased (from 0. 14 to 0. 26 ) with the increase of wire feeding speed while the torch oscillating. And it decreased linearly with the increase of torch oscillating amplitude. However, the influelwe of oscillating speed, wire extension and welding voltage on the D/W ratio of welds was not obvious. 展开更多
关键词 flux-cored wire underwater wet welding depth-to-width ratio
下载PDF
Development of the active flux in superalloy laser welding and the effect on the weld formation 被引量:3
4
作者 Chen Yuhua Liu Dongya +1 位作者 Xie Jilin Yue Zuzhen 《China Welding》 EI CAS 2017年第1期44-48,共5页
In this study,adopting uniform design method established a mathematical model to prepare multi-element active flux. GH4169 superalloy plates were welded by the Nd: YAG laser equipment with the prepared active flux. Th... In this study,adopting uniform design method established a mathematical model to prepare multi-element active flux. GH4169 superalloy plates were welded by the Nd: YAG laser equipment with the prepared active flux. The results show all kinds of fluxes increase the depth to width ratio and the multi-component systems are more significant. The largest increment of the weld depth to width ratio is 159%,obtained by using of the F12 series flux. It is proved that by using of the active flux to increase the depth to width ratio of micro laser welding is feasible. 展开更多
关键词 micro-laser welding DEVELOPMENT of active FLUXES uniform design method depth to width ratio
下载PDF
Burrow Characteristics and Microhabitat Use of the Turpan Wonder Gecko Teratoscincus roborowskii (Squamata, Gekkonidae) 被引量:3
5
作者 Yucheng SONG Yang LIU +2 位作者 Yingying LIN Tao LIANG Lei SHI 《Asian Herpetological Research》 SCIE CSCD 2017年第1期61-69,共9页
Burrow structural charactersitcs and microhabitat use of the Turpan wonder gecko Teratoscincus roborowskii (Gekkonidae) were studied between April and September of 2013 in the Turpan Eremophytes Botanic Garden, in t... Burrow structural charactersitcs and microhabitat use of the Turpan wonder gecko Teratoscincus roborowskii (Gekkonidae) were studied between April and September of 2013 in the Turpan Eremophytes Botanic Garden, in the Turpan Depression of Western China. Burrow depth, entrance orientation, entrance height and width were observed. We assessed microhabitat selection and noted differences in microhabitat use among males, females, and juveniles. The magnitude of selection was measured using Jacobs' index of selectivity. Entrance height and width of the burrows of adults were significantly larger than those of juveniles, but the difference in burrow depth was not significant. The directional orientation of the burrow entrance showed a preference for the north-northeast and south-southeast, which were likely influenced by local prevailing winds and sunlight. Both the adult and juvenile geckos prefer to construct their burrows in sandy soil within a layer of loose soil whose thickness is greater than 30 cm. A majority of the burrows were located within 20 m of the nearest plant. Nearly half (48%) of the entrances of juveniles were located within 5 m of the nearest vegetation, significantly different from those of the adults. Results showed that the Turpan wonder gecko did not utilize microhabitats according to their availability, but rather that it preferred rnicrohabitats which contained dead wood or the caper bush. Our results suggested that burrow characteristics and microhabitat selection were important factors in T. roborowskii adaptation to harsh and arid desert habitats. 展开更多
关键词 arid desert habitat burrow depth entrance height entrance orientation entrance width microhabitatselection retreat site
下载PDF
Innovation Analysis Approach to Design Parameters of High Speed Train Carriage and Their Intrinsic Complexity Relationships 被引量:1
6
作者 Shou-Ne Xiao Ming-Meng Wang +1 位作者 Guang-Zhong Hu Guang-Wu Yang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第5期1091-1100,共10页
In view of the problem that it's difficult to accurately grasp the influence range and transmission path of the vehicle top design requirements on the underlying design parameters. Applying directed-weighted complex ... In view of the problem that it's difficult to accurately grasp the influence range and transmission path of the vehicle top design requirements on the underlying design parameters. Applying directed-weighted complex network to product parameter model is an important method that can clarify the relationships between product parameters and establish the top-down design of a product. The relationships of the product parameters of each node are calculated via a simple path searching algorithm, and the main design parameters are extracted by analysis and comparison. A uniform definition of the index formula for out-in degree can be provided based on the analysis of out- in-degree width and depth and control strength of train carriage body parameters. Vehicle gauge, axle load, crosswind and other parameters with higher values of the out-degree index are the most important boundary condi- tions; the most considerable performance indices are the parameters that have higher values of the out-in-degree index including torsional stiffness, maximum testing speed, service life of the vehicle, and so on; the main design parameters contain train carriage body weight, train weight per extended metre, train height and other parameters with higher values of the in-degree index. The network not only provides theoretical guidance for exploring the relationship of design parameters, but also further enriches the appli- cation of forward design method to high-speed trains. 展开更多
关键词 Train carriage body parameters Complexnetwork width influence depth influence Parametercontrol strength
下载PDF
Spatial-temporal characterization of the San Andreas Fault by fault-zone trapped waves at seismic experiment site,Parkfield,California 被引量:2
7
作者 Yong-Gang Li 《Earthquake Science》 2021年第3期261-285,共25页
In this article,we review our previous research for spatial and temporal characterizations of the San Andreas Fault(SAF)at Parkfield,using the fault-zone trapped wave(FZTW)since the middle 1980s.Parkfield,California h... In this article,we review our previous research for spatial and temporal characterizations of the San Andreas Fault(SAF)at Parkfield,using the fault-zone trapped wave(FZTW)since the middle 1980s.Parkfield,California has been taken as a scientific seismic experimental site in the USA since the 1970s,and the SAF is the target fault to investigate earthquake physics and forecasting.More than ten types of field experiments(including seismic,geophysical,geochemical,geodetic and so on)have been carried out at this experimental site since then.In the fall of 2003,a pair of scientific wells were drilled at the San Andreas Fault Observatory at Depth(SAFOD)site;the main-hole(MH)passed a~200-m-wide low-velocity zone(LVZ)with highly fractured rocks of the SAF at a depth of~3.2 km below the wellhead on the ground level(Hickman et al.,2005;Zoback,2007;Lockner et al.,2011).Borehole seismographs were installed in the SAFOD MH in 2004,which were located within the LVZ of the fault at~3-km depth to probe the internal structure and physical properties of the SAF.On September 282004,a M6 earthquake occurred~15 km southeast of the town of Parkfield.The data recorded in the field experiments before and after the 2004 M6 earthquake provided a unique opportunity to monitor the co-mainshock damage and post-seismic heal of the SAF associated with this strong earthquake.This retrospective review of the results from a sequence of our previous experiments at the Parkfield SAF,California,will be valuable for other researchers who are carrying out seismic experiments at the active faults to develop the community seismic wave velocity models,the fault models and the earthquake forecasting models in global seismogenic regions. 展开更多
关键词 San andreas fault fault-zone trapped wave low-velocity zonewave guide effect dispersion strong ground motion earthquake hazard propagator matrix finite-difference simulation dynamic rupture fault zone width and depth co-mainshock damage post-seismic healing seismic experimental site SAFOD
下载PDF
A Set of Three Technologies Will Save Mankind from Climate Change in the Most Inexpensive Way Possible
8
作者 Michael Noppe 《Journal of Environmental Science and Engineering(B)》 CAS 2024年第5期177-180,共4页
This paper formulates a set of three technologies that should deal with the greatest threat to mankind—climate change at the lowest cost.The main technology will be“Sunny Rain”.It considers technology to prevent er... This paper formulates a set of three technologies that should deal with the greatest threat to mankind—climate change at the lowest cost.The main technology will be“Sunny Rain”.It considers technology to prevent eruptions of submarine volcanoes at shallow depths and technologies that provide scalable and impactful solutions to reduce carbon emissions across diverse industries as complementary technologies used to reduce cost.A list of submarine volcanoes at shallow depths that are likely to spew waterborne dust into the atmosphere has begun to be created.If the governments of Japan,Italy,and Greece,which have submarine volcanoes at shallow depths(Kiki,Marsili,Columbo),prevent eruptions of these volcanoes,it will provide electricity to these countries,save many of their citizens from death,and save humanity from the greatest threat—climate change—in the most inexpensive way possible! 展开更多
关键词 Fighting climate change at minimal cost Sunny Rain technology to prevent eruptions of submarine volcanoes at shallow depths
下载PDF
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 被引量:1
9
作者 Rodney Alexander 《Journal of Information Security》 2020年第4期261-291,共31页
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th... The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables). 展开更多
关键词 Information Assurance Defense in depth Information technology Network Security CYBERSECURITY Linear Regression Analysis PandEMIC
下载PDF
Theoretical analyses on bed topography responses in large depth-to-width ratio river bends with constant curvatures 被引量:2
10
作者 Shuxian GAO Haijue XU Yuchuan BAI 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2018年第5期747-766,共20页
Bed morphology is the result of a dynamic response to a complex meandering river system. It is an important factor for the further development of river. Based on the meandering river characterized by a large depth-to-... Bed morphology is the result of a dynamic response to a complex meandering river system. It is an important factor for the further development of river. Based on the meandering river characterized by a large depth-to-width ratio, a theoretical model is established with the coupling of Navier-Stokes (N-S)~ sediment transport, and bed deformation equations. The flow characteristics and bed response of river are obtained with the perturbation method. The research results show that, under the effect of two- dimensional flow disturbance, the bars and pools present the regular response. For a given sinuousness, the amplitude of the bed response can be used as a criterion to judge the bedform stability. The effects of the Reynolds number, disturbance wavenumber, sinuousness, and bed morphology gradient on the bed response development are described. 展开更多
关键词 meandering river large depth-to-width ratio channel disturbance wave bed response
下载PDF
Characterization of spectral hole depth in Tm^(3+) :YAG within the cryogenic temperature range
11
作者 陈雷 马秀荣 +4 位作者 王伟 张双根 穆宽林 王夏洋 张世宇 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期413-417,共5页
In this paper, spectral hole depth dependence on temperature below 10 K in Tm^3+ :YAG crystal is investigated in detail. A novel model is proposed to analyze the temperature dependence on the spectral hole. By using... In this paper, spectral hole depth dependence on temperature below 10 K in Tm^3+ :YAG crystal is investigated in detail. A novel model is proposed to analyze the temperature dependence on the spectral hole. By using the proposed model, we theoretically deduce the temperature dependence of spectral hole depth. The results are compared with experimental results and they are in good agreement. According to the theoretic results, the optimum temperature in experiment can be found. 展开更多
关键词 phonon process spectral hole depth spectral hole width Tm^3+ :YAG
下载PDF
Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study
12
作者 Rodney Alexander 《Journal of Information Security》 2017年第3期166-173,共8页
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing dev... Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cyber security as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1 - 5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures is then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks. 展开更多
关键词 INFORMATION ASSURANCE Analytical HIERARCHY Process DEFENSE in depth INFORMATION technology
下载PDF
Research on Characteristics of the Lateral Settlement Trough Caused by Shield Construction 被引量:1
13
作者 璩继立 葛修润 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第4期525-529,542,共6页
The characteristics of settlement trough induced by shield construction in soft soil area in Shanghai were analyzed based on test materials in situ. The shape of the trough, the relationship between trough and buried ... The characteristics of settlement trough induced by shield construction in soft soil area in Shanghai were analyzed based on test materials in situ. The shape of the trough, the relationship between trough and buried depth of tunnel, trough evolvement with time and relationship between trough width coefficient and buried depth of tunnel and time were profoundly researched by mainly using the methods of statistics, fitting, comparison and drawing, deriving the conclusions which are of important guidance in the area. 展开更多
关键词 SETTLEMENT TROUGH SHIELD construction BURIED depth of TUNNEL width coefficient
下载PDF
Video Recognition for Analyzing the Characteristics of Vehicle–Bicycle Conflict 被引量:1
14
作者 Xingjian Xue Zixu Wang +3 位作者 Linjuan Ge Lirong Deng Rui Song Neal Naixue Xiong 《Computers, Materials & Continua》 SCIE EI 2021年第11期2779-2791,共13页
Vehicle–bicycle conflict incurs a higher risk of traffic accidents,particularly as it frequently takes place at intersections.Mastering the traffic characteristics of vehicle–bicycle conflict and optimizing the desi... Vehicle–bicycle conflict incurs a higher risk of traffic accidents,particularly as it frequently takes place at intersections.Mastering the traffic characteristics of vehicle–bicycle conflict and optimizing the design of intersections can effectively reduce such conflict.In this paper,the conflict between right-turning motor vehicles and straight-riding bicycles was taken as the research object,and T-Analyst video recognition technology was used to obtain data on riding(driving)behavior and vehicle–bicycle conflict at seven intersections in Changsha,China.Herein,eight typical traffic characteristics of vehicle–bicycle conflict are summarized,the causes of vehicle–bicycle conflict are analyzed using 18 factors in three dimensions,the internal relationship between intersection design factors and traffic conflicts is explored,and the guiding of design optimization based on the width of bicycle lanes and the soft separation between vehicles and bicycles is discussed.The results showed that colored paved bicycle lanes were better,performing better at a width of 2.5 m compared to 1.5 m.However,the colored pavement was not suitable for the entire road and had to be set at the position,at which the trajectories of a bicycle and motor vehicle overlapped.Thus,a 2.5-m-wide bicycle lane provides good safety.However,there are still defects in the existing safety indicators,so it is necessary to develop new indicators to reflect real vehicle–bicycle conflict situations more comprehensively. 展开更多
关键词 Vehicle-bicycle conflict video recognition technology bicycle lane width vehicle-bicycle separation method
下载PDF
Technical analysis of 3DTV and outstanding issues
15
作者 张兆杨 程浩 +1 位作者 沈礼权 杨高波 《Journal of Shanghai University(English Edition)》 CAS 2011年第4期316-320,共5页
This paper analyzes the technical characteristic of three-dimensional display technology (3DTV) system and some core technologies yet to be solved. It points out the ways to solve these problems and presents an effe... This paper analyzes the technical characteristic of three-dimensional display technology (3DTV) system and some core technologies yet to be solved. It points out the ways to solve these problems and presents an effective solution for thediscomfort of watching the three-dimensional TV. 展开更多
关键词 three-dimensional (3D) display multi-view/depth coding inter-view rendering discomfort of watching threedimensional display technology (3DTV)
下载PDF
Calculating minimum perforating depth with consideration of plastic deformation around well-hole
16
作者 罗勇 《Journal of Coal Science & Engineering(China)》 2007年第2期140-143,共4页
In order to obtain the perforation depth, the three zones with different permeability because of plastic deformation and fluid invasion were studied based on related theories. The study shows that the calculation of p... In order to obtain the perforation depth, the three zones with different permeability because of plastic deformation and fluid invasion were studied based on related theories. The study shows that the calculation of perforation depth should take account of not only damaged zone, but also plastic zone, because the plastic zone has much lower permeability. The required minimum perforation depth was obtained by making the solution of elastic/plastic equations, and the factors affecting perforation depth were analyzed accordingly. 展开更多
关键词 elastoplasticity perforation depth reservoir permeability technology ofshielded temporary plugging
下载PDF
Rolling Deformations and Residual Stresses of Large Circular Saw Body 被引量:1
17
作者 Boleslaw Porankiewicz Jari Parantainen Karolina Ostrowska 《Engineering(科研)》 2010年第9期727-732,共6页
Rolling path squeezes and rolling residual stresses of large diameter circular saw body for wood, generated by rolling pressure from 10 up to 120 bar were examined. X-ray diffraction, Barkhausen noise (BN) and Full Wi... Rolling path squeezes and rolling residual stresses of large diameter circular saw body for wood, generated by rolling pressure from 10 up to 120 bar were examined. X-ray diffraction, Barkhausen noise (BN) and Full Width of the peak at a Half Maximum (FWHM) (o) methods for evaluation of residual stresses were used. Dependencies of a tangential rolling residual stresses inside rolling paths upon rolling pressure p (bar) and rolling area A (mm2) were evaluated. The rolling pressure, as large as 60 bar, resulting in the rolling squeeze as high as 0.04 mm2, and, tangential residual compression stresses inside a rolling path, as large as ?TI = ?822 MPa, was considered to be the largest for the practical application. 展开更多
关键词 Circular Saw Rolling Squeeze Area Rolling Squeeze width Rolling Squeeze depth Rolling Pressure Tangential Rolling Residual Stresses Radial Rolling Residual Stresses X-Ray Diffraction Barkhausen Noise FWHM
下载PDF
Research on wind erosion processes and controlling factors based on wind tunnel test and 3D laser scanning technology
18
作者 YAN Ping WANG Xiaoxu +2 位作者 ZHENG Shucheng WANG Yong LI Xiaomei 《Journal of Arid Land》 SCIE CSCD 2022年第9期1009-1021,共13页
The study of wind erosion processes is of great importance to the prevention and control of soil wind erosion.In this study,three structurally intact soil samples were collected from the steppe of Inner Mongolia Auton... The study of wind erosion processes is of great importance to the prevention and control of soil wind erosion.In this study,three structurally intact soil samples were collected from the steppe of Inner Mongolia Autonomous Region,China and placed in a wind tunnel where they were subjected to six different wind speeds(10,15,17,20,25,and 30 m/s)to simulate wind erosion in the wind tunnel.After each test,the soil surfaces were scanned by a 3D laser scanner to create a high-resolution Digital Elevation Model(DEM),and the changes in wind erosion mass and microtopography were quantified.Based on this,we performed further analysis of wind erosion-controlling factors.The study results showed that the average measurement error between the 3D laser scanning method and weighing method was 6.23%for the three undisturbed soil samples.With increasing wind speed,the microtopography on the undisturbed soil surface first became smooth,and then fine stripes and pits gradually developed.In the initial stage of wind erosion processes,the ability of the soil to resist wind erosion was mainly affected by the soil hardness.In the late stage of wind erosion processes,the degree of soil erosion was mainly affected by soil organic matter and CaCO_(3)content.The results of this study are expected to provide a theoretical basis for soil wind erosion control and promote the application of 3D laser scanners in wind erosion monitoring. 展开更多
关键词 3D laser scanning technology wind erosion wind tunnel test wind erosion depth MICROTOPOGRAPHY soil hardness
下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
19
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 INFORMATION ASSURANCE LATIN SQUARE Design Model DEFENSE in depth INFORMATION technology Network Security CYBERSECURITY
下载PDF
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
20
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 Information Assurance Bayesian Networks Influence Diagrams Defense in depth Information technology Network Security CYBERSECURITY
下载PDF
上一页 1 2 70 下一页 到第
使用帮助 返回顶部