期刊文献+
共找到861篇文章
< 1 2 44 >
每页显示 20 50 100
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
1
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Impacts of Nontraditional Security Issues on National Security 被引量:1
2
作者 Fu Xiaoqiang Han Liqun 《Contemporary International Relations》 2022年第4期48-64,共17页
New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and ... New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats. 展开更多
关键词 nontraditional security issues national security securITIZATION
下载PDF
The Essence of Non-Traditional Security Issues and Their Solutions 被引量:1
3
作者 Huang Zhaoyu Su Qin 《Contemporary International Relations》 2009年第6期28-45,共18页
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio... Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences. 展开更多
关键词 The Essence of Non-Traditional security issues and Their Solutions security
下载PDF
Review of PLC Security Issues in Industrial Control System 被引量:1
4
作者 Xiaojun Pan Zhuoran Wang Yanbin Sun 《Journal of Cyber Security》 2020年第2期69-83,共15页
Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ... Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods. 展开更多
关键词 Industrial control system PLC security issues PLC safety protection
下载PDF
Ethnic Issues of China's Neighboring Countries and Their Impact on National Security
5
作者 Zhao Lei Xu Huiying 《Contemporary International Relations》 2017年第5期69-97,共29页
In the international community,the internal ethnic issues of one country can easily spread out of its borders through the impact of internal and external factors to affect the national security of other countries,know... In the international community,the internal ethnic issues of one country can easily spread out of its borders through the impact of internal and external factors to affect the national security of other countries,known as the spillover effect.Presently,the ethnic issues of China's neighboring countries that have real consequences on the country's national security break down mainly into four types:the internal ethnic conflict,the transnational ethnic issue,the issues related with immigrants and the collaboration of the Three Forces.The risk of spillover can be summed up according to the intensity of its effect in five categories:infiltration,springboard,spillover,immigration and harassment.As diverse ethnic issues of the neighboring countries have different effects on China's national security,the Chinese government must grasp the core element of each issue to formulate specific policies. 展开更多
关键词 Neighboring countries ethnic issues national security
下载PDF
Two Issues in Studying Security Environment
6
作者 Yin Gang Yin Gang is an Associate Research Professor at the Institute for West Asian and Southeast Asian Studies, the Chinese Academy of Social Sciences. 《Contemporary International Relations》 2003年第1期12-16,共5页
To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take ti... To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is 展开更多
关键词 in security Two issues in Studying security Environment of ROK that HAVE
下载PDF
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue 被引量:1
7
作者 Wahid Rajeh 《Journal of Information Security》 2022年第2期23-42,共20页
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be... Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Because of that, the technology remained vulnerable to malicious activities of unauthorized users whose purpose is to endanger system functionalities or to compromise private user data. Researchers and developers are continuously trying to solve these issues by upgrading Hadoop’s security mechanisms and preventing undesirable malicious activities. In this paper, the most common HDFS security problems and a review of unauthorized access issues are presented. First, Hadoop mechanism and its main components are described as the introduction part of the leading research problem. Then, HDFS architecture is given, and all including components and functionalities are introduced. Further, all possible types of users are listed with an accent on unauthorized users, which are of great importance for the paper. One part of the research is dedicated to the consideration of Hadoop security levels, environment and user assessments. The review also includes an explanation of Log Monitoring and Audit features, and detail consideration of authorization and authentication issues. Possible consequences of unauthorized access to a system are covered, and a few recommendations for solving problems of unauthorized access are offered. Honeypot nodes, security mechanisms for collecting valuable information about malicious parties, are presented in the last part of the paper. Finally, the idea for developing a new type of Intrusion Detector, which will be based on using an artificial neural network, is presented. The detector will be an integral part of a new kind of virtual honeypot mechanism and represents the initial base for future scientific work of authors. 展开更多
关键词 Hadoop security issue Unauthorized Access Honeypot Node Intrusion Detector
下载PDF
Guest Editorial Special Issue on Network and Communication Security
8
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA Guest Editorial Special issue on Network and Communication security very CHEN OVER
下载PDF
Guest Editorial Special Issue on Information Security
9
作者 Chin-Chen Chang Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2011年第4期289-290,共2页
The Intemet is a popular channel for allowing more and more users to exchange information without geographical limitations and time restrictions. Therefore, a large amount of digital data, such as digital images, text... The Intemet is a popular channel for allowing more and more users to exchange information without geographical limitations and time restrictions. Therefore, a large amount of digital data, such as digital images, text, audio, and video, is transmitted over the Intemet. Unfortunately, sensitive digital data can be intercepted by malicious users of the Internet, so the development of techniques for ensuring the secrecy and security of data during transmission has become a top priority. 展开更多
关键词 In Guest Editorial Special issue on Information security DATA
下载PDF
Announcing a Special Issue on Network and Communication Security
10
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special issue on Network and Communication security WILL NCS
下载PDF
Guest Editorial Special Issue on Information Security and Applications
11
作者 Chi-Shiang Chan Yi-Hui Chen Yuan-Yu Tsai 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期209-210,共2页
With the growing of digitized data transforming on Internet,the issues of information security,data privacy,and forensic analysis have become more and more attracted.Researchers have provided solutions for problems in... With the growing of digitized data transforming on Internet,the issues of information security,data privacy,and forensic analysis have become more and more attracted.Researchers have provided solutions for problems in the field.The objective of this special issue is to present research and development activities in the various aspects.After a very careful review, 展开更多
关键词 Guest Editorial Special issue on Information security and Applications NFC
下载PDF
ZTE Communications Special Issue on Security and Privacy in Communications
12
《ZTE Communications》 2015年第3期41-41,共1页
Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communica... Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication. 展开更多
关键词 security ZTE Communications Special issue on security and Privacy in Communications
下载PDF
Virtualization Security, Strategy and Management
13
作者 Simon Tran Stuart Gold 《International Journal of Communications, Network and System Sciences》 2014年第10期423-429,共7页
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
关键词 VIRTUALIZATION Technology VIRTUAL MACHINE security issues security MANAGEMENT Framework
下载PDF
Safeguarding Cloud Computing Infrastructure:A Security Analysis
14
作者 Mamdouh Alenezi 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期159-167,共9页
Cloud computing is the provision of hosted resources,comprising software,hardware and processing over the World Wide Web.The advantages of rapid deployment,versatility,low expenses and scalability have led to the wide... Cloud computing is the provision of hosted resources,comprising software,hardware and processing over the World Wide Web.The advantages of rapid deployment,versatility,low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes,mostly as a component of the combination/multi-cloud infrastructure structure.While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion,new opportunities and challenges in the context of security vulnerabilities are emerging in this domain.Cloud security,also recognized as cloud computing security,refers to a collection of policies,regulations,systematic processes that function together to secure cloud infrastructure systems.These security procedures are designed to safeguard cloud data,to facilitate regulatory enforcement and to preserve the confidentiality of consumers,as well as to lay down encryption rules for specific devices and applications.This study presents an overview of the innovative cloud computing and security challenges that exist at different levels of cloud infrastructure.In this league,the present research work would be a significant contribution in reducing the security attacks on cloud computing so as to provide sustainable and secure services. 展开更多
关键词 Cloud computing cloud security cloud security issues security attacks INTRUSION
下载PDF
Google Maps Security Concerns
15
作者 Aqil Burney Muhammad Asif +1 位作者 Zain Abbas Shamaila Burney 《Journal of Computer and Communications》 2018年第1期275-283,共9页
Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, ... Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place. 展开更多
关键词 Google Maps ANONYMOUS USERS CYBERCRIME security issues security CONCERNS Spatial Information Signup Mechanism Potential Threats
下载PDF
Current Cloud Computing Security Concerns from Consumer Perspective
16
作者 Hafiz Gulfam Ahmad Zeeshan Ahmad 《机床与液压》 北大核心 2013年第24期1-5,共5页
In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto incr... In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises,having no investment for new infrastructure,no software license requirement and no need of any training.Security concern is the main limitation factor in the growth of this new born technology.The security responsibilities of both,the provider and the consumer greatly differ between cloud service models.In this paper we discuss a variety of security risks,authentication issues,trust,and legal regularity in cloud environment with consumer perspective.Early research focused only on technical and business consequences of cloud computing and ignored consumer perspective.Therefore,this paper discusses the consumer security and privacy preferences. 展开更多
关键词 云计算 电子商务 信息化建设 供应商
下载PDF
Research on Heterogeneous Data Sharing in Early Warning System for Grain Security
17
作者 GUO Heng-chuan,ZHAO Guo-zeng Department of Computer and Information Engineering,Luoyang Institute of Science and Technolog,Luoyang 471023 《Agricultural Science & Technology》 CAS 2010年第5期174-177,共4页
The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,... The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,the problem-solution approach of heterogeneous data sharing was discussed through middleware technologies. Based on this method,and according to the characteristics of early warning system for grain security,the technology of data sharing in this system were researched and explored to solve the issues of collection of heterogeneous data sharing. 展开更多
关键词 Middle ware Early Waming System Web XML Dataset
下载PDF
形式论与实质论:国家安全问题的两种认定模式及其内在张力
18
作者 陈如超 李金锋 《西南政法大学学报》 2024年第1期148-160,共13页
国家安全问题是指国家重大利益被侵犯和可能被侵犯的问题。根据所侵犯的重大利益是否需要法律规范进行明确规定,国家安全问题的认定可以分为形式论和实质论两种模式。形式论认为,国家安全问题所侵犯的重大利益必须由法律规范明确规定;... 国家安全问题是指国家重大利益被侵犯和可能被侵犯的问题。根据所侵犯的重大利益是否需要法律规范进行明确规定,国家安全问题的认定可以分为形式论和实质论两种模式。形式论认为,国家安全问题所侵犯的重大利益必须由法律规范明确规定;而实质论认为,国家安全问题所侵犯的重大利益不一定需要由法律规范明确规定,只要该利益在实质层面上属于国家重大利益即可。在国家安全问题的认定方面,形式论和实质论存在一定程度的相斥性;在国家安全问题的治理逻辑方面,形式论和实质论又存在一定程度的背离性。形式论与实质论之间的张力,容易诱发欠安全化和泛安全化两类认定误区,并导致产生国家治理手段违法和过度的双重困境。解决两类认定模式之间存在的内在张力,应当采取实质形式化的方式,推动国家安全问题认定实现三种转变:反应激励从义务引导型向福利供给型转变、认定过程从被动反应型向主动回应型转变、认定结果从分散隐蔽型向集中公开型转变。 展开更多
关键词 国家安全问题 形式论 实质论 内在张力 实质形式化
下载PDF
人工智能和社会科学研究
19
作者 刘刚 李响 +1 位作者 李沁倩 刘捷 《理论与现代化》 2024年第2期80-91,共12页
人工智能属于通用目的技术,不仅能够引发产业变革,而且能够催生新科学研究范式。随着以生成式人工智能为代表的通用人工智能的发展,人工智能的应用成为社会科学研究范式创新的前沿。数据的高维度、编程语言的强结构性和长程关联性、以... 人工智能属于通用目的技术,不仅能够引发产业变革,而且能够催生新科学研究范式。随着以生成式人工智能为代表的通用人工智能的发展,人工智能的应用成为社会科学研究范式创新的前沿。数据的高维度、编程语言的强结构性和长程关联性、以参数形式表征的隐式知识库和预训练的结构重整带来新知识和模式发现,为社会科学研究创造出新的发展空间。同时,数据隐私、价值观和研究结论的“黑箱”化带来了人工智能在社会科学应用中的新挑战。如何把大模型的知识发现和基于研究者实践经验的探索式研究相结合,形成人机共生演进的知识生产方式,是社会科学研究中人工智能应用的方向。 展开更多
关键词 人工智能 大模型 社会科学 对齐问题 隐私安全
下载PDF
生成式伪造语音安全问题与解决方案
20
作者 冯畅 吴晓龙 +2 位作者 赵熠扬 徐明星 郑方 《信息安全研究》 CSCD 北大核心 2024年第2期122-129,共8页
生成式人工智能算法的发展使得生成式伪造语音更加自然流畅,人类听力难以分辨真伪.首先分析了生成式伪造语音不当滥用对社会造成的一系列威胁,如电信诈骗更加泛滥、语音应用程序安全性下降、司法鉴定公正性受到影响、综合多领域的伪造... 生成式人工智能算法的发展使得生成式伪造语音更加自然流畅,人类听力难以分辨真伪.首先分析了生成式伪造语音不当滥用对社会造成的一系列威胁,如电信诈骗更加泛滥、语音应用程序安全性下降、司法鉴定公正性受到影响、综合多领域的伪造信息欺骗社会大众等.然后从技术发展角度,对生成式伪造语音的生成算法和检测算法分别进行总结与分类,阐述算法流程步骤及其中的关键点,并分析了技术应用的挑战点.最后从技术应用、制度规范、公众教育、国际合作4方面阐述了如何预防以及解决生成式伪造语音带来的安全问题. 展开更多
关键词 生成式人工智能 伪造语音 伪造语音安全问题 伪造语音检测 伪造语音威胁解决
下载PDF
上一页 1 2 44 下一页 到第
使用帮助 返回顶部