期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Cyberspace Endogenous Safety and Security 被引量:3
1
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
On challenges of AI to cognitive security and safety 被引量:1
2
作者 Ruiyang Huang Xiaoqing Zheng +1 位作者 Yuting Shang Xiangyang Xue 《Security and Safety》 2023年第2期44-56,共13页
Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence(AI),fueling the jump in ChatGPT-like large language models(LLMs).As with any emerging technology,it is a two-sided coin,... Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence(AI),fueling the jump in ChatGPT-like large language models(LLMs).As with any emerging technology,it is a two-sided coin,bringing not only vast social impacts but also significant security concerns,especially in the socio-cognitive domain.Against this back-ground,this work starts with an inherent mechanism analysis of cognitive domain games,from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system.Finally,inspired by behavioral mimicry in biology,this work will elaborate on new approaches to cognitive security from three aspects:Mimicry Computing,Mimicry Defense,and Mimicry Intelligence. 展开更多
关键词 Cognitive security Artificial intelligence Endogenous safety and security Mimicry intelligence
原文传递
WARA-PS:a research arena for public safety demonstrations and autonomous collaborative rescue robotics experimentation
3
作者 Olov Andersson Patrick Doherty +5 位作者 Mårten Lager Jens-Olof Lindh Linnea Persson Elin A.Topp Jesper Tordenlid Bo Wahlberg 《Autonomous Intelligent Systems》 2021年第1期104-134,共31页
A research arena(WARA-PS)for sensing,data fusion,user interaction,planning and control of collaborative autonomous aerial and surface vehicles in public safety applications is presented.The objective is to demonstrate... A research arena(WARA-PS)for sensing,data fusion,user interaction,planning and control of collaborative autonomous aerial and surface vehicles in public safety applications is presented.The objective is to demonstrate scientific discoveries and to generate new directions for future research on autonomous systems for societal challenges.The enabler is a computational infrastructure with a core system architecture for industrial and academic collaboration.This includes a control and command system together with a framework for planning and executing tasks for unmanned surface vehicles and aerial vehicles.The motivating application for the demonstration is marine search and rescue operations.A state-of-art delegation framework for the mission planning together with three specific applications is also presented.The first one concerns model predictive control for cooperative rendezvous of autonomous unmanned aerial and surface vehicles.The second project is about learning to make safe real-time decisions under uncertainty for autonomous vehicles,and the third one is on robust terrain-aided navigation through sensor fusion and virtual reality tele-operation to support a GPS-free positioning system in marine environments.The research results have been experimentally evaluated and demonstrated to industry and public sector audiences at a marine test facility.It would be most difficult to do experiments on this large scale without the WARA-PS research arena.Furthermore,these demonstrator activities have resulted in effective research dissemination with high public visibility,business impact and new research collaborations between academia and industry. 展开更多
关键词 Autonomous systems Intelligent system architectures Research demonstration arena Autonomous drones Autonomous marine vessels Public safety and security Collaborative robotics
原文传递
Multi-Energy Gamma-Ray Attenuations for Non-Destructive Detection of Hazardous Materials
4
作者 Kaylyn Olshanoski Chary Rangacharyulu 《Journal of Modern Physics》 2022年第1期66-80,共15页
We present a non-destructive method (NDM) to identify minute quantities of high atomic number (<em>Z</em>) elements in containers such as passenger baggage, goods carrying transport trucks, and environment... We present a non-destructive method (NDM) to identify minute quantities of high atomic number (<em>Z</em>) elements in containers such as passenger baggage, goods carrying transport trucks, and environmental samples. This method relies on the fact that photon attenuation varies with its energy and properties of the absorbing medium. Low-energy gamma-ray intensity loss is sensitive to the atomic number of the absorbing medium, while that of higher-energies vary with the density of the medium. To verify the usefulness of this feature for NDM, we carried out simultaneous measurements of intensities of multiple gamma rays of energies 81 to 1408 keV emitted by sources<sup> 133</sup>Ba (half-life = 10.55 y) and <sup>152</sup>Eu (half-life = 13.52 y). By this arrangement, we could detect minute quantities of lead and copper in a bulk medium from energy dependent gamma-ray attenuations. It seems that this method will offer a reliable, low-cost, low-maintenance alternative to X-ray or accelerator-based techniques for the NDM of high-Z materials such as mercury, lead, uranium, and transuranic elements etc. 展开更多
关键词 Non-Destructive Detection Multi-Energy Photons Radioactive Sources Intensity Measurements safety and security XCOM Calculations
下载PDF
Construction technology for deep tunnels crossing superhigh-temperature fault zones with high water surges
5
作者 Yong ZHAO Tingyu ZHU +1 位作者 Li YU Ming LU 《Frontiers of Structural and Civil Engineering》 SCIE EI CSCD 2024年第8期1267-1280,共14页
The harsh environment in tunnels with high geothermal temperatures and humidity can adversely impact machinery,personnel,and construction.The main causes of specific problems are the unknown mechanisms of local geothe... The harsh environment in tunnels with high geothermal temperatures and humidity can adversely impact machinery,personnel,and construction.The main causes of specific problems are the unknown mechanisms of local geothermal formation,inappropriate temperature control measures,and insufficient systematic safeguards.In this study,three work sections relating to a high geothermal tunnel are:the tunnel face,middle-of-tunnel section,and outside-oftunnel section.A cooling strategy is proposed to offer technical support in achieving comprehensive cooling,overall as well as for each of the sections.First,a comprehensive geological survey explores the mechanism and exact location of the heat source.Secondly,grouting and centralized drainage measures are used to control the heat release of hot water.Enhanced ventilation,ice chillers and other applicable measures are used to control the ambient temperature.Finally,a monitoring and early warning system is established to prevent accidents.This cooling strategy has been applied in the field with good results. 展开更多
关键词 high geothermal tunnels cooling strategy comprehensive cooling measures safety and security
原文传递
工业控制系统内生安全防护体系 被引量:1
6
作者 辛耀中 《Security and Safety》 2023年第3期20-28,共9页
According to the essential characteristic of industrial control system(ICS),endogenous safety and security(ESS)can be achieved by merging cyber security(CS)into functional safety(FS).In this paper,the basic principles... According to the essential characteristic of industrial control system(ICS),endogenous safety and security(ESS)can be achieved by merging cyber security(CS)into functional safety(FS).In this paper,the basic principles,functional requirements and protection architecture(TEMt)of ESS are proposed,and the successful experience of an electric power control system is introduced. 展开更多
关键词 Industrial control system Endogenous safety and security Protection architecture
原文传递
从完美保密到完美安全:基于密码学的内生安全分析
7
作者 金梁 胡晓言 邬江兴 《Security and Safety》 2023年第3期4-19,共16页
In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of i... In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced. 展开更多
关键词 perfect instinct function security perfect secrecy DHR endogenous security One-Time Reconstruction generalized safety and security perfect security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部