期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
基于知识图谱的通信网络链路数据篡改攻击保护方法
1
作者 高翔 《通信与信息技术》 2023年第4期57-59,95,共4页
针对现有链路数据篡改攻击检测准确率低、防御性能不佳等问题,提出一种新的通信网络链路数据篡改攻击保护方法。首先,在知识图谱的基础上,提出针对通信链路数据的一种防篡改攻击检测方法,以验证检测的链路层是否受到了侵犯,再根据两种... 针对现有链路数据篡改攻击检测准确率低、防御性能不佳等问题,提出一种新的通信网络链路数据篡改攻击保护方法。首先,在知识图谱的基础上,提出针对通信链路数据的一种防篡改攻击检测方法,以验证检测的链路层是否受到了侵犯,再根据两种不同的数据传递规则来确定防御节点,并对篡改攻击数据进行言语转换,达到对通信网络中数据篡改攻击进行防护的目的。仿真实验结果表明,该算法的识别精度在93%以上,并且具有很好的防御能力,可使其具有良好的通信数据传输安全性能,值得推广。 展开更多
关键词 知识图谱 通信网络 通信链路 数据篡改 攻击保护
下载PDF
鸡传染性囊病二价活疫苗攻击保护效果的观察 被引量:2
2
作者 刘爵 刘有昌 +2 位作者 姚炜光 周蛟 王平 《华北农学报》 CSCD 北大核心 1998年第2期132-136,共5页
使用SPF雏鸡进行了鸡传染性囊病二价活疫苗攻击保护效果的观察。14日龄免疫2000TCID50剂量的二价苗或BJ836单价苗,免疫后14d(28日龄)分别用不同剂量(1∶1、1∶10、1∶100)的标准Ⅰ型强毒株CJ... 使用SPF雏鸡进行了鸡传染性囊病二价活疫苗攻击保护效果的观察。14日龄免疫2000TCID50剂量的二价苗或BJ836单价苗,免疫后14d(28日龄)分别用不同剂量(1∶1、1∶10、1∶100)的标准Ⅰ型强毒株CJ801株或标准变异株强毒1084A株进行攻击,攻击后5d剖杀观察。二价苗免疫组能抵抗极高剂量(1∶1)的CJ801株及高剂量(1∶10)的1084A株的攻击,但不能抵抗极高剂量(1∶1)的1084A株攻击。BJ836疫苗免疫组能抵抗高剂量(1∶10)的CJ801珠及低剂量(1∶100)的1084A株的攻击,但不能抵抗极高剂量(1∶1)的CJ801株及高剂量(1∶10)的1084A的攻击。 展开更多
关键词 鸡病 传染性囊病 二价活疫苗 攻击保护效果
下载PDF
智能配用电系统的网络攻击检测与保护控制技术:发展与挑战 被引量:2
3
作者 曾嵘 李勇 +2 位作者 曹一家 谢李为 邵霞 《电气工程学报》 CSCD 2023年第2期125-141,共17页
先进信息技术在智能配用电系统(Smart power distribution and utilization system,SPDUS)中的广泛应用,加深了系统信息侧与电力物理侧的耦合程度,智能配用电系统已逐渐转变为信息-物理空间高度融合、信息资源与物理资源相互结合与协调... 先进信息技术在智能配用电系统(Smart power distribution and utilization system,SPDUS)中的广泛应用,加深了系统信息侧与电力物理侧的耦合程度,智能配用电系统已逐渐转变为信息-物理空间高度融合、信息资源与物理资源相互结合与协调的智能配用电信息物理系统(Smart power distribution and utilization cyber physical system,SPDU-CPS)。本文重点从面向SPDU-CPS的网络攻击入侵检测、网络攻击防御保护以及自愈控制三个角度,对国内外相关技术的发展与挑战进行总结、梳理。在网络攻击入侵检测方面,总结了基于偏差类、基于特征类以及混合类网络攻击检测方法的检测思路及实施路径;在网络攻击防御保护方面,总结了提升信息网络防御能力的信息侧保护方法、基于资源优化配置和数据校正保护的物理侧保护方法以及融合两侧信息及保护功能的信息物理协同保护方法;在自愈控制方面,对传统电力物理侧自愈控制以及基于信息物理协同的自愈控制现有研究进行了归纳和整理。最后,结合SPDU-CPS的特点及发展趋势,对未来研究方向进行了展望。 展开更多
关键词 智能配用电系统 信息物理系统 网络攻击入侵检测 网络攻击防御保护 自愈控制
下载PDF
多保护对象,多攻击目标攻击的目标威胁评估 被引量:1
4
作者 王树千 夏海宝 +1 位作者 龙文彪 马健 《火控雷达技术》 2017年第1期32-37,共6页
随着信息化快速发展,空中指挥控制成为预警机发展的一种必然趋势。由此引出多保护对象,多攻击目标的排序问题。本文分析了目标、预警机与被保护对象之间的态势关系,利用坐标转换获取影响目标威胁评估的因素值,然后根据迭代原理,利用多... 随着信息化快速发展,空中指挥控制成为预警机发展的一种必然趋势。由此引出多保护对象,多攻击目标的排序问题。本文分析了目标、预警机与被保护对象之间的态势关系,利用坐标转换获取影响目标威胁评估的因素值,然后根据迭代原理,利用多重灰色关联分析法,计算得出多目标对于多对象整体而言的综合威胁评估值。最后,通过案例仿真验证,表明本文所提算法与实际情况相符,且易于工程实现。 展开更多
关键词 保护对象多攻击目标 综合威胁评估 坐标转换 多重灰色关联
下载PDF
表达IBDV VP2免疫原的HVT重组体接种雏鸡对IBDV攻击的…
5
作者 Dart.,P 罗满林 《国外兽医学(畜禽传染病)》 1996年第3期26-28,共3页
构建了表达了传染性法氏囊病病毒(IBDV)VP2的两种火鸡疱疹病毒(HVT)重组体vHVT001和vHVT002。用其接种1日龄雏鸡以评价它们对IBDV52/70株和马立克氏病病毒(MDV)RB1B株攻击的保护效果。... 构建了表达了传染性法氏囊病病毒(IBDV)VP2的两种火鸡疱疹病毒(HVT)重组体vHVT001和vHVT002。用其接种1日龄雏鸡以评价它们对IBDV52/70株和马立克氏病病毒(MDV)RB1B株攻击的保护效果。在IBDV攻击中,vHVT002免疫鸡能预防死亡和法氏囊肉眼病变,具有良好的保护力,以10^5PFU免疫能达100%、10^4PFU免疫能达60%保护。 展开更多
关键词 鸡病 雏鸡 IBDV 火鸡疱疹病毒 攻击保护
下载PDF
一种新的基于指纹与移动端协助的口令认证方法 被引量:8
6
作者 安迪 杨超 +1 位作者 姜奇 马建峰 《计算机研究与发展》 EI CSCD 北大核心 2016年第10期2400-2411,共12页
智能手机和互联网应用的广泛普及,使用户可以借助手机结合口令与服务器认证.然而现有的方案需要在手机端存储用户的秘密信息.一旦存于手机的秘密信息被对手获得,将给用户带来不可挽回的损失.针对上述问题,提出了一种基于指纹和口令的认... 智能手机和互联网应用的广泛普及,使用户可以借助手机结合口令与服务器认证.然而现有的方案需要在手机端存储用户的秘密信息.一旦存于手机的秘密信息被对手获得,将给用户带来不可挽回的损失.针对上述问题,提出了一种基于指纹和口令的认证方案,手机端无需存储秘密信息.其核心思想是,将密文存储在服务器端,用户登录时利用手机辅助其生成私钥,从而对注册阶段生成的密文解密生成认证密钥.生成私钥的过程需要输入口令和指纹,用户在电脑端输入口令后对口令进行盲化再与手机进行交互,这样就可以保护用户口令不被对手得到.理论分析及实验结果表明:该方案提高了用户秘密信息的安全性,可以抵御对手的字典攻击、重放攻击和钓鱼攻击,减少了手机的存储压力,易于部署. 展开更多
关键词 口令认证 终端辅助认证 指纹认证 口令攻击保护 基于指纹的口令盲化
下载PDF
第4—7层模块化交换机——网捷网络
7
《通讯世界》 2004年第5期87-87,共1页
关键词 网捷网络公司 交换机 拒绝服务攻击保护 刀片服务器
下载PDF
鸽新城疫油乳剂灭活苗的研制
8
作者 顾凯 《畜牧兽医科技信息》 1999年第9期7-7,共1页
江苏省畜牧兽医总站陈昌海等,用分离到的鸽新城疫(ND)病毒株,试制了鸽新城疫油乳剂灭活苗,进行了安全性、免疫性测定,并与鸡ND油乳剂灭活苗对比试验。用该苗接种5只鸽子,观察2周:注射部位无炎症反应,精神、食欲正常。注苗的鸽子10天产... 江苏省畜牧兽医总站陈昌海等,用分离到的鸽新城疫(ND)病毒株,试制了鸽新城疫油乳剂灭活苗,进行了安全性、免疫性测定,并与鸡ND油乳剂灭活苗对比试验。用该苗接种5只鸽子,观察2周:注射部位无炎症反应,精神、食欲正常。注苗的鸽子10天产生抗体,21天HI抗体达高峰,第56天HI抗体维持较高水平。攻毒试验表明,此苗对鸽ND分离毒的攻击保护率100%(5/5)。 展开更多
关键词 鸽新城疫 灭活苗 油乳剂 攻击保护 HI抗体 对比试验 畜牧兽医总站 攻毒试验 炎症反应 免疫性
下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
9
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
10
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET 被引量:2
11
作者 ZHU Xiaoling HU Donghui HOU Zhengfeng DING Liang 《China Communications》 SCIE CSCD 2014年第9期60-67,共8页
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a... Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET. 展开更多
关键词 vehicular ad hoc network locationbased services location k-anonymity securemulti-party computation
下载PDF
乙型脑炎减毒活疫苗和灭活疫苗免疫效果评价 被引量:5
12
作者 刘欣玉 那瑞 +4 位作者 俞永新 赵丹华 赵欣 徐宏山 李玉华 《中国生物制品学杂志》 CAS CSCD 2018年第9期929-931,935,共4页
目的对目前市场上的乙型脑炎(简称乙脑)减毒活疫苗和灭活疫苗的免疫效果进行评价。方法将乙脑减毒活疫苗和灭活疫苗以相同剂量免疫小鼠14 d后,采集一部分小鼠血液,分离血清,检测中和抗体水平;另一部分用乙脑病毒强毒P3株进行腹腔攻击,... 目的对目前市场上的乙型脑炎(简称乙脑)减毒活疫苗和灭活疫苗的免疫效果进行评价。方法将乙脑减毒活疫苗和灭活疫苗以相同剂量免疫小鼠14 d后,采集一部分小鼠血液,分离血清,检测中和抗体水平;另一部分用乙脑病毒强毒P3株进行腹腔攻击,观察小鼠存活情况,计算疫苗的保护率。结果乙脑减毒活疫苗和灭活疫苗原倍免疫小鼠后,抗体阳转率均为100%,乙脑病毒强毒攻击后保护率均为100%;乙脑减毒活疫苗1∶20稀释免疫小鼠后,抗体阳转率为90%,攻击保护率为100%。乙脑灭活疫苗1∶20稀释免疫小鼠后抗体阳转率为80%,乙脑病毒强毒攻击后保护率为70%。结论目前市场上应用的乙脑减毒活疫苗和乙脑灭活疫苗均是有效的,乙脑减毒活疫苗的保护效果更好。但通过接种不同的抗原量和采用不同的免疫程序,均可消除免疫保护效果的差异。 展开更多
关键词 乙脑减毒活疫苗 乙脑灭活疫苗 免疫效果 攻击保护
原文传递
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
13
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,whi... Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption,compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality(LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing(VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks. 展开更多
关键词 Networked control systems Security Cyber attacks Stochastic stability Cryptographic protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部