期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
网络犯罪相关罪名法律适用问题研究 被引量:10
1
作者 张慧 《现代法学》 CSSCI 北大核心 2019年第4期156-167,共12页
为更好地防范和打击网络违法犯罪行为,我国刑事立法进一步拓宽了网络犯罪的刑法打击范围。如何实现新增罪名的准确适用是当前的重要问题。关于非法利用信息网络罪,要注意对行为方式和'情节严重'的把握,关于帮助信息网络犯罪活动... 为更好地防范和打击网络违法犯罪行为,我国刑事立法进一步拓宽了网络犯罪的刑法打击范围。如何实现新增罪名的准确适用是当前的重要问题。关于非法利用信息网络罪,要注意对行为方式和'情节严重'的把握,关于帮助信息网络犯罪活动罪,需要加强对'明知'和'情节严重'的认知;关于拒不履行信息网络安全管理义务罪,要注意对信息网络安全管理义务的范畴和监管部门的范围与层级予以明确。 展开更多
关键词 非法利用信息网络 帮助信息网络犯罪活动罪 拒不履行信息网络安
下载PDF
福建省人民政府办公厅关于加强我省政府类互联网站安全管理的通知
2
《福建省人民政府公报》 2007年第29期40-40,43,共2页
各市、县(区)人民政府,省人民政府各部门、各直属机构:为加强我省政府类互联网站的安全管理,确保网站健康有序发展,现就加强我省政府类互联网站安全管理工作通知如下:一、要高度重视网站安全管理工作各级各单位要高度重视信息安全工作,... 各市、县(区)人民政府,省人民政府各部门、各直属机构:为加强我省政府类互联网站的安全管理,确保网站健康有序发展,现就加强我省政府类互联网站安全管理工作通知如下:一、要高度重视网站安全管理工作各级各单位要高度重视信息安全工作,把信息安全放到至关重要的位置上,切实加强本单位互联网站的安全管理,正确处理好安全与发展的关系,按照以发展求安全。 展开更多
关键词 互联网站 信息 工作通知 直属机构 网站 网络信息 全技术措施 网络全漏洞 信息网络安
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
3
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model 被引量:3
4
作者 苏贵洋 李建华 +1 位作者 马颖华 李生红 《Journal of Zhejiang University Science》 EI CSCD 2004年第9期1106-1113,共8页
With the flooding of pornographic information on the Internet, how to keep people away from that offensive information is becoming one of the most important research areas in network information security. Some applica... With the flooding of pornographic information on the Internet, how to keep people away from that offensive information is becoming one of the most important research areas in network information security. Some applications which can block or filter such information are used. Approaches in those systems can be roughly classified into two kinds: metadata based and content based. With the development of distributed technologies, content based filtering technologies will play a more and more important role in filtering systems. Keyword matching is a content based method used widely in harmful text filtering. Experiments to evaluate the recall and precision of the method showed that the precision of the method is not satisfactory, though the recall of the method is rather high. According to the results, a new pornographic text filtering model based on reconfirming is put forward. Experiments showed that the model is practical, has less loss of recall than the single keyword matching method, and has higher precision. 展开更多
关键词 Pornographic text filtering Content based filtering Information filtering Network content security
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
5
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
Research on Network Platform of Information Management and Security
6
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
Construction of Three-dimensional power security Defense System Based on T-S Model Fuzzy Neural Network
7
作者 Zeyu SUN 《International Journal of Technology Management》 2015年第5期105-108,共4页
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex... With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment. 展开更多
关键词 Information network power security Neural network Network environment Data FEATURE Threat information
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
8
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
Network security situation and development prospect
9
作者 Hua Du 《International Journal of Technology Management》 2013年第11期3-5,共3页
Network information security is an important issue mattering national security and sovereignty, social stability, cultural inheritance and development. Its importance is escalating with the accelerated pace of global ... Network information security is an important issue mattering national security and sovereignty, social stability, cultural inheritance and development. Its importance is escalating with the accelerated pace of global information. Information security is a comprehensive discipline involving computer science, network technology, communication technology, cryptography, information security technology, applied mathematics, number theory, information theory and other disciplines. It mainly refers to the condition that network hardware, software and system data are protected from destruction, change and divulgation from accidental or malicious reasons so that the system can run continuously and reliably with no interrupted network service. 展开更多
关键词 NETWORK SECURITY development prospect.
下载PDF
Building Taiwan Aeropolis of Airports through Infrastructuring Care and Integrity
10
作者 Li-Yen Hsu 《Journal of Civil Engineering and Architecture》 2017年第6期608-615,共8页
Global changes, including the rise of the sea level and frequent terrible disasters, are apparently threatening the living environment. For environmental mitigation, security, and sustainability, Taiwan should have re... Global changes, including the rise of the sea level and frequent terrible disasters, are apparently threatening the living environment. For environmental mitigation, security, and sustainability, Taiwan should have reliable, incorporative area-based security-information networks to protect their environments. Plural (dual) surveillance which is rooted in biologic senses, e.g., from two-eyes, can have the feature of fault-tolerance, availability and maintainability in monitoring tasks. Further, it can fit the contemporary wireless communication methods being incorporated with MIMO (multi-in multi-out), to prevent information loss, interference, unexpected changes caused by such as clogged water and chemical reactions. Consequently, network prototypes, including SW (spider-web)network and CCC (cube-connected cycle), are proactively suggested. More reliable capabilities, including those encouraging local ferries and drones, for efficient logistic operation and mixed-use buildings with quality assured performance, can be good for smart urban growth, resource utilization in Taiwan, which is aimed as an aerotropolis--a means for placemaking. 展开更多
关键词 Clogged water dual (plural) surveillance environmental mitigation MIMO smart growth.
下载PDF
A Design of the Network Security Evaluation System
11
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 Security Evaluation Security Rules Evaluation Algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部