期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
网络公共场所私密信息的界定与司法保护
1
作者 徐梦婷 《法学(汉斯)》 2024年第9期5586-5593,共8页
在互联网时代,物理空间的隐私侵权问题逐渐延伸到网络空间,随着对传统上“公共场所无隐私”理论的打破,网络公共场所隐私的界定也逐渐为学界所关注。在《民法典》将个人信息权益和隐私权两者区分的二元保护路径下,作为交叉地带的私密信... 在互联网时代,物理空间的隐私侵权问题逐渐延伸到网络空间,随着对传统上“公共场所无隐私”理论的打破,网络公共场所隐私的界定也逐渐为学界所关注。在《民法典》将个人信息权益和隐私权两者区分的二元保护路径下,作为交叉地带的私密信息适用隐私权规则保护,这也引起司法实践中对私密信息的界定和保护难题。“场景一致理论”在承认信息流动中风险存在的前提下,采用独特的风险评估方法对个人信息流动每个阶段的隐私进行预测。立足在网络环境中场景不断变化的情况下,尽可能降低信息流动中造成的隐私风险。 展开更多
关键词 网络公共场所 私密信息 场景一致性理论
原文传递
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
2
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部