国标GB/T 7190.1—2008《玻璃纤维增强塑料冷却塔第1部分中小型玻璃纤维增强塑料冷却塔》与美国冷却技术协会标准CTI STD—201 Standard for the Certification of Water-Cooling Tower Thermal Performance是目前国内空调制冷用冷却塔...国标GB/T 7190.1—2008《玻璃纤维增强塑料冷却塔第1部分中小型玻璃纤维增强塑料冷却塔》与美国冷却技术协会标准CTI STD—201 Standard for the Certification of Water-Cooling Tower Thermal Performance是目前国内空调制冷用冷却塔应用较多的2个标准,但是二者内涵完全不同。通过对2个标准的性质、技术及质量要求、试验及评价方法进行系统的比较分析,解析二者的差异性以及对项目可能带来的问题及影响,提出标准适用性意见。展开更多
CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中...CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中的实施效果,来体现初中数学教学的基础性价值。文章将在CTI模式的三个环节方面提出相应的策略。Compared with traditional knowledge teaching, the CTI teaching model reflects the combination of knowledge understanding and core literacy. It is more conducive to cultivating students’ core literacy in mathematics. However, the present mathematics curriculum standard does not answer how to cultivate students’ core quality through knowledge teaching. This paper will put forward the corresponding strategies in three aspects of CTI mode.展开更多
There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small...There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack.展开更多
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy...The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.展开更多
文摘国标GB/T 7190.1—2008《玻璃纤维增强塑料冷却塔第1部分中小型玻璃纤维增强塑料冷却塔》与美国冷却技术协会标准CTI STD—201 Standard for the Certification of Water-Cooling Tower Thermal Performance是目前国内空调制冷用冷却塔应用较多的2个标准,但是二者内涵完全不同。通过对2个标准的性质、技术及质量要求、试验及评价方法进行系统的比较分析,解析二者的差异性以及对项目可能带来的问题及影响,提出标准适用性意见。
文摘CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中的实施效果,来体现初中数学教学的基础性价值。文章将在CTI模式的三个环节方面提出相应的策略。Compared with traditional knowledge teaching, the CTI teaching model reflects the combination of knowledge understanding and core literacy. It is more conducive to cultivating students’ core literacy in mathematics. However, the present mathematics curriculum standard does not answer how to cultivate students’ core quality through knowledge teaching. This paper will put forward the corresponding strategies in three aspects of CTI mode.
文摘There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack.
基金supported by China’s National Key R&D Program,No.2019QY1404the National Natural Science Foundation of China,Grant No.U20A20161,U1836103the Basic Strengthening Program Project,No.2019-JCJQ-ZD-113.
文摘The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.