In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak...Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business...Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data.展开更多
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog...In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.展开更多
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens...With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
The atmospheric corrosion monitoring(ACM)technique has been widely employed to track the real-time corrosion behavior of metal materials.However,limited studies have applied ACM to the corrosion protection properties ...The atmospheric corrosion monitoring(ACM)technique has been widely employed to track the real-time corrosion behavior of metal materials.However,limited studies have applied ACM to the corrosion protection properties of organic coatings.This study compared a bare epoxy coating with one containing zinc phosphate corrosion inhibitors,both applied on ACM sensors,to observe their corrosion protection properties over time.Coatings with artificial damage via scratches were exposed to immersion and alternating dry and wet environments,which allowed for monitoring galvanic corrosion currents in real-time.Throughout the corrosion tests,the ACM currents of the zinc phosphate/epoxy coating were considerably lower than those of the blank epoxy coating.The trend in ACM current variations closely matched the results obtained from regular electrochemical tests and surface analysis.This alignment highlights the potential of the ACM technique in evaluating the corrosion protection capabilities of organic coatings.Compared with the blank epoxy coating,the zinc phosphate/epoxy coating showed much-decreased ACM current values that confirmed the effective inhibition of zinc phosphate against steel corrosion beneath the damaged coating.展开更多
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect...The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat...Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.展开更多
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device...The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand.展开更多
As an important transportation hub in China,the traffic volume and driving speed are important aspects of expressways.Therefore,the protection requirements for roadbed side slopes are higher,and it is necessary to res...As an important transportation hub in China,the traffic volume and driving speed are important aspects of expressways.Therefore,the protection requirements for roadbed side slopes are higher,and it is necessary to resist rainwater erosion and other damages by protecting the side slopes.Therefore,it is necessary to adopt effective technical means of subgrade protection and support.This paper mainly summarizes the characteristics of highway subgrade slope protection construction and slope protection and support technologies.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural ...Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural reform, this paper analyzed the grain storage security countermeasures under the new normal conditions with "grain storage technology", one of the national grain security strategies of China during the 13th Five-year Plan, as the guiding ideology, from the perspectives of scientific technologies, policy supports, government supports and talent construction, so as to provide supports for the storage enterprises with vulnerable technological links. In addition, the food security issues discussed in this paper could be a helping hand in improving people's living quality, enhancing grain storage ecological quality, promoting grain green storage quality security, and be of important and profound strategic significance to enhance the macro-control capability of the government, maintain social stability and people's health.展开更多
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation...Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
Taking lightning-protection engineering of Wuhan Changshankou landfill and incineration plants for the example,in this article,we have discussed the integrated technology of direct lightning protection by early stream...Taking lightning-protection engineering of Wuhan Changshankou landfill and incineration plants for the example,in this article,we have discussed the integrated technology of direct lightning protection by early streamer emission lightning rod,lifting lightning rod and mobile lightning rod. Additionally,lightning protection methods and measures of landfill with large receiving area of lightning strike and landfill gas and incineration plant with irregular landfill cell are explored.展开更多
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
文摘Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
文摘Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data.
文摘In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.
文摘With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
基金financially supported by the National Natural Science Foundation of China(No.52371049)the Young Elite Scientists Sponsorship Program by the China Association for Science and Technology(YESS,No.2020QNRC001)the National Science and Technology Resources Investigation Program of China(Nos.2021FY100603 and 2019FY101404)。
文摘The atmospheric corrosion monitoring(ACM)technique has been widely employed to track the real-time corrosion behavior of metal materials.However,limited studies have applied ACM to the corrosion protection properties of organic coatings.This study compared a bare epoxy coating with one containing zinc phosphate corrosion inhibitors,both applied on ACM sensors,to observe their corrosion protection properties over time.Coatings with artificial damage via scratches were exposed to immersion and alternating dry and wet environments,which allowed for monitoring galvanic corrosion currents in real-time.Throughout the corrosion tests,the ACM currents of the zinc phosphate/epoxy coating were considerably lower than those of the blank epoxy coating.The trend in ACM current variations closely matched the results obtained from regular electrochemical tests and surface analysis.This alignment highlights the potential of the ACM technique in evaluating the corrosion protection capabilities of organic coatings.Compared with the blank epoxy coating,the zinc phosphate/epoxy coating showed much-decreased ACM current values that confirmed the effective inhibition of zinc phosphate against steel corrosion beneath the damaged coating.
文摘The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.
文摘The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand.
文摘As an important transportation hub in China,the traffic volume and driving speed are important aspects of expressways.Therefore,the protection requirements for roadbed side slopes are higher,and it is necessary to resist rainwater erosion and other damages by protecting the side slopes.Therefore,it is necessary to adopt effective technical means of subgrade protection and support.This paper mainly summarizes the characteristics of highway subgrade slope protection construction and slope protection and support technologies.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金Supported by the Fund Project for the Scientific Undertakings in Public Interest of Liaoning Province(20170046)the Initiation Project of Economic and Social Development of Liaoning Province(2018lslktyb)the Initiation Project of Economic and Social Development of Shenyang City in 2017(SYSK2017-13-11)~~
文摘Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural reform, this paper analyzed the grain storage security countermeasures under the new normal conditions with "grain storage technology", one of the national grain security strategies of China during the 13th Five-year Plan, as the guiding ideology, from the perspectives of scientific technologies, policy supports, government supports and talent construction, so as to provide supports for the storage enterprises with vulnerable technological links. In addition, the food security issues discussed in this paper could be a helping hand in improving people's living quality, enhancing grain storage ecological quality, promoting grain green storage quality security, and be of important and profound strategic significance to enhance the macro-control capability of the government, maintain social stability and people's health.
基金one of the research fruits of“A Study of the Public Interest Litigation and Security Mechanism for the Quality and Safety of Agricultural Products”(15BGL135)general project granted by the National Social Sciences Planning Office
文摘Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘Taking lightning-protection engineering of Wuhan Changshankou landfill and incineration plants for the example,in this article,we have discussed the integrated technology of direct lightning protection by early streamer emission lightning rod,lifting lightning rod and mobile lightning rod. Additionally,lightning protection methods and measures of landfill with large receiving area of lightning strike and landfill gas and incineration plant with irregular landfill cell are explored.