当前,针对Web应用层的分布式拒绝服务攻击(distributed denial of service,DDoS)形式愈加严峻,但是对此类DDoS的缓解手段研究较少且技术不够成熟,并且主要聚集于攻击过程中的检测和流量清洗,而缺乏针对Web服务器资源消耗脆弱性的主动检...当前,针对Web应用层的分布式拒绝服务攻击(distributed denial of service,DDoS)形式愈加严峻,但是对此类DDoS的缓解手段研究较少且技术不够成熟,并且主要聚集于攻击过程中的检测和流量清洗,而缺乏针对Web服务器资源消耗脆弱性的主动检测手段.为此,提出了面向Web服务资源消耗脆弱性的检测模型和评测框架,能够检测Web服务资源消耗脆弱点,并且评测Web服务资源消耗脆弱程度,旨在Web服务受到攻击前预先分析和了解Web服务的资源消耗脆弱性安全问题,为网站安全性能优化和需要采取的防御手段提供支撑.通过对某网站的实际测评验证了本模型和框架的有效性,能够通过对实际应用的网站进行Web服务资源消耗脆弱性检测和评测,发现其Web服务资源消耗脆弱点.展开更多
International joint ventures (IJVs) have increasingly their role in business world and also in research field of international business. There have been a lot of studies related to determinant factors of IJV perform...International joint ventures (IJVs) have increasingly their role in business world and also in research field of international business. There have been a lot of studies related to determinant factors of IJV performance. However, there are very few studies focusing on the measurement of I Jr performance. Especially, researchers have ignored how foreign parent firms really choose their measures in the evaluation of their IJV performance. This research investigates determinant factors of performance measures of 1JVs. Determinant factors of IJV performance measures include motives for establishment, establishment mode, location of IJVs, distribution of ownership in IJVs, cultural background of parent firms, and trust between partners, IJV life stages, parent firms' international experience, and relatedness of the IJVs to their parents. Performance measures are divided into financial measures and non-financial measures. The paper shows how different determinant factors are expected to lead foreign parent firms preferring one kind of measure over the other.展开更多
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel...Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.展开更多
Entity recognition and disambiguation (ERD) is a crucial technique for knowledge base population and information extraction. In recent years, numerous papers have been published on this subject, and various ERD syst...Entity recognition and disambiguation (ERD) is a crucial technique for knowledge base population and information extraction. In recent years, numerous papers have been published on this subject, and various ERD systems have been developed. However, there are still some confusions over the ERD field for a fair and complete comparison of these systems. Therefore, it is of emerging interest to develop a unified evaluation framework. In this paper, we present an easy-to-use evaluation framework (EUEF), which aims at facilitating the evaluation process and giving a fair comparison of ERD systems. EUEF is well designed and released to the public as an open source, and thus could be easily extended with novel ERD systems, datasets, and evaluation metrics. It is easy to discover the advantages and disadvantages of a specific ERD system and its components based on EUEF. We perform a comparison of several popular and publicly available ERD systems by using EUEF, and draw some interesting conclusions after a detailed analysis.展开更多
The fragility of ecosystem health has become a key factor hindering the sustainable development of the ecological environment. Through a review of published research from domestic and foreign scholars, starting from t...The fragility of ecosystem health has become a key factor hindering the sustainable development of the ecological environment. Through a review of published research from domestic and foreign scholars, starting from the endogenous logic of studies in the field of ecosystem vulnerability(EV), this paper sorts out the literature on the aspects of measurement models, prediction methods and risk assessment, comprehensively defines the research category and scientific framework of EV, and analyzes the research ideas and development trends. We arrived at the following conclusions: 1) The connotation of ecosystem vulnerability not only embodies the change in the vulnerability of the natural environment, but it also reflects the irreversible damage to the ecosystem caused by excessive development and industrial production activities. 2) The setting of ecosystem vulnerability indices should aim to fully reflect the essential features of that vulnerability, which should include the index systems of natural, social, economic and other related factors. 3) There are many types of ecosystem vulnerability measurement methods, prediction models and risk evaluation models, which have different focuses and advantages. The most appropriate method should be adopted for conducting comprehensive and systematic evaluation, prediction and estimation according to the different representation and evolution mechanisms of the chosen research object and regional ecosystem vulnerability. 4) Based on the regional system characteristics, corresponding risk management measures should be proposed, and pertinent policy suggestions should be put forward to improve the ecological safety and sustainable development of an ecologically vulnerable area.展开更多
文摘当前,针对Web应用层的分布式拒绝服务攻击(distributed denial of service,DDoS)形式愈加严峻,但是对此类DDoS的缓解手段研究较少且技术不够成熟,并且主要聚集于攻击过程中的检测和流量清洗,而缺乏针对Web服务器资源消耗脆弱性的主动检测手段.为此,提出了面向Web服务资源消耗脆弱性的检测模型和评测框架,能够检测Web服务资源消耗脆弱点,并且评测Web服务资源消耗脆弱程度,旨在Web服务受到攻击前预先分析和了解Web服务的资源消耗脆弱性安全问题,为网站安全性能优化和需要采取的防御手段提供支撑.通过对某网站的实际测评验证了本模型和框架的有效性,能够通过对实际应用的网站进行Web服务资源消耗脆弱性检测和评测,发现其Web服务资源消耗脆弱点.
文摘International joint ventures (IJVs) have increasingly their role in business world and also in research field of international business. There have been a lot of studies related to determinant factors of IJV performance. However, there are very few studies focusing on the measurement of I Jr performance. Especially, researchers have ignored how foreign parent firms really choose their measures in the evaluation of their IJV performance. This research investigates determinant factors of performance measures of 1JVs. Determinant factors of IJV performance measures include motives for establishment, establishment mode, location of IJVs, distribution of ownership in IJVs, cultural background of parent firms, and trust between partners, IJV life stages, parent firms' international experience, and relatedness of the IJVs to their parents. Performance measures are divided into financial measures and non-financial measures. The paper shows how different determinant factors are expected to lead foreign parent firms preferring one kind of measure over the other.
基金partly supported by National Natural Science Foundation of China (NSFC grant numbers: 61202110 and 61502205)the project of Jiangsu provincial Six Talent Peaks (Grant numbers: XYDXXJS-016)
文摘Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.
基金Project supported by the National Natural Science Foundation of China (No. 61572434), the China Knowledge Centre for Engineering Sciences and Technology (No. CKC-EST-2015-2-5), and the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP), China (No. 20130101110-136)
文摘Entity recognition and disambiguation (ERD) is a crucial technique for knowledge base population and information extraction. In recent years, numerous papers have been published on this subject, and various ERD systems have been developed. However, there are still some confusions over the ERD field for a fair and complete comparison of these systems. Therefore, it is of emerging interest to develop a unified evaluation framework. In this paper, we present an easy-to-use evaluation framework (EUEF), which aims at facilitating the evaluation process and giving a fair comparison of ERD systems. EUEF is well designed and released to the public as an open source, and thus could be easily extended with novel ERD systems, datasets, and evaluation metrics. It is easy to discover the advantages and disadvantages of a specific ERD system and its components based on EUEF. We perform a comparison of several popular and publicly available ERD systems by using EUEF, and draw some interesting conclusions after a detailed analysis.
基金The National Social Science Fundation of China (17XJY020)The National Natural Science Foundation of China (71963028)The Discipline Construction Project for Ningxia Institutions of Higher Education (Discipline of Theoretical Economics)(NXYLXK2017B04)。
文摘The fragility of ecosystem health has become a key factor hindering the sustainable development of the ecological environment. Through a review of published research from domestic and foreign scholars, starting from the endogenous logic of studies in the field of ecosystem vulnerability(EV), this paper sorts out the literature on the aspects of measurement models, prediction methods and risk assessment, comprehensively defines the research category and scientific framework of EV, and analyzes the research ideas and development trends. We arrived at the following conclusions: 1) The connotation of ecosystem vulnerability not only embodies the change in the vulnerability of the natural environment, but it also reflects the irreversible damage to the ecosystem caused by excessive development and industrial production activities. 2) The setting of ecosystem vulnerability indices should aim to fully reflect the essential features of that vulnerability, which should include the index systems of natural, social, economic and other related factors. 3) There are many types of ecosystem vulnerability measurement methods, prediction models and risk evaluation models, which have different focuses and advantages. The most appropriate method should be adopted for conducting comprehensive and systematic evaluation, prediction and estimation according to the different representation and evolution mechanisms of the chosen research object and regional ecosystem vulnerability. 4) Based on the regional system characteristics, corresponding risk management measures should be proposed, and pertinent policy suggestions should be put forward to improve the ecological safety and sustainable development of an ecologically vulnerable area.