期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
门禁技术在动物笼舍安全技防改造中的应用
1
作者 吴菡 《畜牧兽医科技信息》 2013年第6期9-11,共3页
本文通过动物笼舍安全技防改造项目建设,介绍了动物笼舍门禁系统的设计思路及系统实现的技术方法。在项目建设中对于门禁技术的应用和尝试,为今后的动物笼舍安全技防工作实践提供了经验。
关键词 动物笼舍 门禁 安全技防
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
2
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Study on multi-component combustible gas explosive characteristics of high gas mine 被引量:2
3
作者 周西华 王继仁 +2 位作者 李昕 李诚玉 胡春岩 《Journal of Coal Science & Engineering(China)》 2008年第4期538-541,共4页
Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxy... Studied on multi-component combustible gas,methane mainly,explosion char- acteristics of high gas mine,obtained the rules of gas explosive limit that influenced by environment temperature,pressure,concentration of oxygen,other combustible gas,coal dust,energy of fire source,and the inert gas,proposed a new method of divide gas explo- sive triangle partition,and gave new partition linear equations.The gas explosive triangle and its new partition has important directive significance in distinguishing if the fire area has a gas explosion when sealing or opening fire area,or fire extinguishing in sealed fire area,and judging if there will be a gas explosion or other trend while fire extinguishing with inert gas. 展开更多
关键词 gas explosion explosive characteristics gas explosive limit
下载PDF
Design and Implementation of Security Solution for Computer Network
4
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
Research on Cyberspace Attack and Defense Confrontation Technology
5
作者 Chengjun ZHOU 《International Journal of Technology Management》 2015年第3期11-14,共4页
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa... This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development. 展开更多
关键词 Intrusion prevention system Attack and defense confrontation Attack tracing Active defense
下载PDF
Memory Safety Based on Probabilistic Memory Allocation
6
作者 Xue Jingfeng Hu Changzhen +2 位作者 Guo Xiaojing Leng Bingxing Ma Rui 《China Communications》 SCIE CSCD 2012年第4期115-122,共8页
Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory... Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable behavior.Aiming to solve the problem,traditional memory allocating strategy is improved and a new probabilistic memory allocation technology is presented.By combining random memory allocating algorithm and virtual memory,memory errors are avoided in all probability during software executing.By replacing default memory allocator to manage allocation of heap memory,buffer overflows and dangling pointers are prevented.Experiments show it is better than Diehard of the following aspects:memory errors prevention,performance in memory allocation set and ability of controlling working set.So probabilistic memory allocation is a valid memory errors prevention technology and it can tolerate memory errors and provide probabilistic memory safety effectively. 展开更多
关键词 software security PROBABILISTIC memory errors memory allocation
下载PDF
Situational Awareness Technology in Network Security
7
作者 YeZheng-wang 《International Journal of Technology Management》 2014年第4期42-44,共3页
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri... With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures. 展开更多
关键词 NETWORK SAFETY situational awareness INVASION APPLICATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部