基于网络控制系统(networked control system,NCS)的网络空间特性,对NCS信息安全的时空特性和NCS的安全域进行了研究,在此基础上提出了一种具有自律可控性和自律可协调性的NCS安全域的新型体系结构,并对新构建的NCS安全域体系的一些关...基于网络控制系统(networked control system,NCS)的网络空间特性,对NCS信息安全的时空特性和NCS的安全域进行了研究,在此基础上提出了一种具有自律可控性和自律可协调性的NCS安全域的新型体系结构,并对新构建的NCS安全域体系的一些关键问题进行了探讨。展开更多
Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in th...Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.展开更多
Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectivel...Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.展开更多
A novel digital secure communication system employing dual synchronization of chaos in two pairs of Colpitts circuits is proposed. The binary information to be transmitted is firstly modulated by digital modulation sc...A novel digital secure communication system employing dual synchronization of chaos in two pairs of Colpitts circuits is proposed. The binary information to be transmitted is firstly modulated by digital modulation scheme, and then mixed together with two chaotic waveforms generated by two Colpitts circuits with different circuit parameters. Thus the combined (and encrypted) signal is transmitted through an additive white Gauss noise (AWGN) channel. In the receiver, the binary message can he recovered only when the parameters of the two Colpitts circuits are known. If the parameters of the two Colpitts circuits are owned by two different users, this can be viewed as a (2,2) threshold scheme. Based on large amount of simulations, the bit error rate (BER) performance of this communication scheme is presented.展开更多
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.展开更多
基金supported by the Civil Aviation Joint Fund of National Natural Science Foundation of China(No.U1533112)。
文摘Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.
文摘Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.
文摘A novel digital secure communication system employing dual synchronization of chaos in two pairs of Colpitts circuits is proposed. The binary information to be transmitted is firstly modulated by digital modulation scheme, and then mixed together with two chaotic waveforms generated by two Colpitts circuits with different circuit parameters. Thus the combined (and encrypted) signal is transmitted through an additive white Gauss noise (AWGN) channel. In the receiver, the binary message can he recovered only when the parameters of the two Colpitts circuits are known. If the parameters of the two Colpitts circuits are owned by two different users, this can be viewed as a (2,2) threshold scheme. Based on large amount of simulations, the bit error rate (BER) performance of this communication scheme is presented.
基金supported by the National Key R&D Program of China (2016YFF0204001)the National Key Technology Support Program (2015BAH08F02)+3 种基金the CCF-Venustech Hongyan Research Initiative (2016-009)the PAPD fundthe CICAEET fundthe Guizhou Provincial Key Laboratory of Public Big Data Program
文摘Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.