期刊文献+
共找到3,293篇文章
< 1 2 165 >
每页显示 20 50 100
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
1
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 Wireless Sensor Network(WSN) Node authentication Blockchain TANGLE worm detection
下载PDF
Simulating Greedy Propagation of P2P Worms 被引量:1
2
作者 Guo-Zheng Wu Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2010年第4期307-311,共5页
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o... Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network. 展开更多
关键词 Greedy propagation Internet worms peer-to-peer network peer-to-peer worms worms propagating.
下载PDF
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
3
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 social network worm immunization strategy network security worm propagation worm containment
下载PDF
侧链含有不同电子受体的聚咔唑衍生物的合成及其WORM型存储性能 被引量:1
4
作者 刘柳 程庆 +2 位作者 樊菲 张斌 陈彧 《功能高分子学报》 CAS CSCD 北大核心 2016年第2期163-171,181,共10页
利用Suzuki偶联反应合成了3种侧链含有不同电子受体的可溶性D-A型聚咔唑衍生物:聚[(9-(2-己基葵基)-9 H-咔唑)-(9-(4-硝基苯基)-9 H-咔唑)](PCz-NO2)、聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲醛)](PC... 利用Suzuki偶联反应合成了3种侧链含有不同电子受体的可溶性D-A型聚咔唑衍生物:聚[(9-(2-己基葵基)-9 H-咔唑)-(9-(4-硝基苯基)-9 H-咔唑)](PCz-NO2)、聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲醛)](PCz-CHO)和聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲腈)](PCz-CN)。基于这3种聚合物的存储器件(器件结构:Al(200nm)/高分子(90nm)/氧化铟锡(ITO)均表现出典型的电双稳电子开关效应和非易失性一次写入多次读出(WORM)型存储性能。随着共轭聚合物光学带隙的增加[2.26eV(PCz-NO2)→2.79eV(PCzCHO)→3.20eV(PCz-CN)],相应器件的启动阈值电压逐渐增大(-1.70V→-1.81V→-1.89V);而电流开关比(ON/OFF)则依次减小(6.63×10^4→4.08×10^4→5.68×10^3)。含氰基的聚咔唑衍生物需要的开启电压最大,展现出来的电流开关比在3种聚合物中则最小。 展开更多
关键词 聚咔唑 D-A型共轭聚合物 worm型存储器件 阈值电压 电流开关比
下载PDF
Parametric Analysis of the End Face Engagement Worm Gear 被引量:11
5
作者 DENG Xingqiao WANG Jueling +2 位作者 WANG Jinge CHEN Shouan YANG Jie 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2015年第6期1177-1185,共9页
A novel specific type of worm drive, so-called end face engagement worm gear(EFEWD), is originally presented to minimize or overcome the gear backlash. Different factors, including the three different types, contact... A novel specific type of worm drive, so-called end face engagement worm gear(EFEWD), is originally presented to minimize or overcome the gear backlash. Different factors, including the three different types, contact curves, tooth profile, lubrication angle and the induced normal curvature are taken into account to investigate the meshing characteristics and create the profile of a novel specific type of worm drive through mathematical models and theoretical analysis. The tooth of the worm wheel is very specific with the sine-shaped tooth which is located at the alveolus of the worm and the tooth profile of a worm is generated by the meshing movement of the worm wheel with the sine-shaped tooth, but just the end face of the worm(with three different typical meshing types) is adapted to meshing, and therefore an extraordinary manufacturing methods is used to generate the profile of the end face engagement worm. The research results indicates that the bearing contacts of the generated conjugate hourglass worm gear set are in line contacts, with certain advantages of no-backlash, high precision and high operating efficiency over other gears and gear systems besides the end face engagement worm gear drive may improve bearing contact, reduce the level of transmission errors and lessen the sensitivity to errors of alignment. Also, the end face engagement worm can be easily made with superior meshing and lubrication performance compared with the conventional techniques. In particular, the meshing and lubrication performance of the end face engagement worm gear by using the end face to meshing can be increased over 10% and 7%, respectively. This investigate is expect to provide a new insight on the design of the future no-backlash worm drive for industry. 展开更多
关键词 worm drive end face engagement worm gear meshing characteristics anti-backlash.
下载PDF
Optimal Design for an End Face Engagement Worm Gear with Multiple Worm-wheel Meshing 被引量:9
6
作者 DENG Xingqiao ZHU Weibing +2 位作者 CHEN Yonghong CHEN Shouan WANG Jinge 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第1期144-151,共8页
To solve the problem for lacking a special mechanical transmission that could provide multiple outputs with high transmission efficiency and good lubrication in the modem industrial, a novel worm gear, named end face ... To solve the problem for lacking a special mechanical transmission that could provide multiple outputs with high transmission efficiency and good lubrication in the modem industrial, a novel worm gear, named end face engagement worm gear, with multiple worm-wheel meshing is proposed for the first time. The essential parameters for the worm gear are optimized to enhance lubrication and meshing properties. Moreover, analysis of variance(ANOVA) is applied to determine the optimum levels and to determine the influence of parameters. The ANOVA results show that the novel end face engagement worm gear with multiple worm wheels provides high lubrication(the lubrication angle is more than 89~) and meshing performance(the induce normal curvature is less than 0.0002 mm '). The interaction between center distance and roller slant distance most strongly influences the lubrication angle(contributed 51.6%), followed by the parameters of center distance(contributed 25.0%), roller slant distance(contributed 16.4%), tooth angle of gear, gear ratio, and roller radius. In addition, roller radius most strongly influences the induced normal curvature(contributed 39.4%), followed by roller slant distance(contributed 15.2%), tooth angle of the gear(contributed 9.0%), center distance, and gear ratio. The proposed worm gear helps to enrich the no-backlash high precision worm drive and the optimal design method can provide a useful reference on performance improvement of other worm gear. 展开更多
关键词 worm gear end face engagement worm optimization optimal design analysis of variance (ANOVA)
下载PDF
WORM存储技术及其在医院中的应用 被引量:3
7
作者 徐浩 辛海燕 楚宏硕 《医疗设备信息》 2006年第8期25-28,34,共5页
本文简要介绍了WORM存储技术的基本概念,指出了基于光盘、磁带和磁盘的WORM技术的实现方法和各自的优缺点,讨论了医疗信息的特征和在医院信息化建设中应用WORM存储技术的必要性和迫切性,并给出了在医院中运用WORM技术的设计方案和应注... 本文简要介绍了WORM存储技术的基本概念,指出了基于光盘、磁带和磁盘的WORM技术的实现方法和各自的优缺点,讨论了医疗信息的特征和在医院信息化建设中应用WORM存储技术的必要性和迫切性,并给出了在医院中运用WORM技术的设计方案和应注意的问题。 展开更多
关键词 worm 存储 光盘 磁带 磁盘 医疗信息 医院信息化
下载PDF
Instant Messaging Worms Propagation Simulation and Countermeasures 被引量:2
8
作者 HU Huaping WEI Jianli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期95-100,共6页
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in... Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation. 展开更多
关键词 instant messaging worms SIMULATION PROPAGATION worm detection and containment
下载PDF
Efficient and accurate worm grinding of spur face gears according to an advanced geometrical analysis and a closed-loop manufacturing process 被引量:1
9
作者 ZHOU Yuan-sheng TANG Zhong-wei +2 位作者 SHI Xian-lin TANG Jin-yuan LI Zheng-min-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2022年第1期1-13,共13页
Worm grinding has been applied to manufacture gears to pursue high accuracy and fine surface finish.When the worm used to grind face gears is manufactured with multi-axis computer numerical control(CNC)machining,the m... Worm grinding has been applied to manufacture gears to pursue high accuracy and fine surface finish.When the worm used to grind face gears is manufactured with multi-axis computer numerical control(CNC)machining,the machining accuracy is usually improved by increasing the number of tool paths with more time cost.Differently,this work proposes a generated method to improve the efficiency by dressing the worm surface with only one path,and a closed-loop manufacturing process is applied to ensure the machining accuracy.According to an advanced geometric analysis,the worm surface is practically approximated as a swept surface generated by a planar curve.Meanwhile,this curve is applied as the profile of a dressing wheel,which is used to dress the worm surface.The practical machining is carried out in a CNC machine tool,which was originally used to grind helical gears.Finally,a closed-loop manufacturing process including machining,measurement,and modification is proposed to compensate the machining errors.The proposed method is validated with simulations and practical experiments. 展开更多
关键词 face gears worm grinding worm dressing geometrical analysis closed-loop manufacturing
下载PDF
Contact Toxicity and Antifeedant Activity of Aconitum flavum Extract against Cabbage Worm
10
作者 梁永锋 刘立红 +1 位作者 刘世巍 丁建海 《Plant Diseases and Pests》 CAS 2010年第6期58-60,72,共4页
[ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extrac... [ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extracts of A. fiavum extracted from five polar solvents including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water; leaf dish method was adopted to determine the antifeedant activities of five solvent ex- tracts including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water against cabbage worm, [ Result] Extracts of A. flavum had high contact toxicity against cabbage worm. When the concentration was 100.00 mg/ml, the corrected mortality at 48 h roached 97.24%, and the insec- ticidal activities of five solvent extracts against cabbage worm in sequence were water 〉 n-butanol 〉 ethyl acetate 〉 ether 〉 petroleum ether, the cor- rected mortality of water extract at 48 h was 95.87% ; the antifeedant activities of five solvent extracts in sequence were water 〉 n-butanol 〉 ethyl ac- etate 〉 ether 〉 petroleum ether. [ Conclusion] Extracts of A. flavum had strong contact toxicity and antifeedant activity against cabbage worm, and the active ingredients with contact toxicity and antifeedant activity might be a kind of polar compound. 展开更多
关键词 Aconitum flavum EXTRACT Cabbage worm Contact toxicity Antifeedant activity
下载PDF
一种WORM光盘文件存储系统的设计
11
作者 杨建东 布鲁诺.瑞斯曼 裴先登 《小型微型计算机系统》 CSCD 北大核心 1996年第3期47-51,共5页
本文讨论了WORM光盘构成文件存储系统时由于写一次特性引起的各种处理方式。给出了一种存档后备式文件系统的设计。详细说明了其层次结构、文卷结构、文件结构,以及用户界面、层内部界面等设计。同时给出了速度及可靠性的设计考虑。
关键词 worm光盘 文件存储系统 设计 光盘存储器
下载PDF
Parametric 3D Modeling of Worm and Worm Gear Based on AutoCAD 被引量:3
12
作者 ANG Xue-ye GUO Yong-kun 《Computer Aided Drafting,Design and Manufacturing》 2010年第1期9-14,共6页
Worm and worm gear are modeled under development environment in AutoCAD based on the principle of ordinary cylindrical worm drive. The drawing commands available in AutoCAD are used to develop worm blank and cutter mo... Worm and worm gear are modeled under development environment in AutoCAD based on the principle of ordinary cylindrical worm drive. The drawing commands available in AutoCAD are used to develop worm blank and cutter models. The solid models of worm and worm gear are obtained through the use of the commands, move, rotate and subtract, to simulate the generating cutting movement on the gear cutting machine. Autolisp language is utilized in programming for parametric modeling of worm and worm gear. The developed program can automatically draw worm and worm gear when users load the wlwg program, input the modulus and the number of threads, handedness, and other parameters. The operation is simple and accurate, providing potentials to speed up product design process and improve efficiency. 展开更多
关键词 CAD parameterized modeling worm worm gear GENERATION AUTOCAD
下载PDF
Win32.SQLExp.Worm蠕虫病毒分析与对策
13
作者 杨斌 聂伟强 《计算机与现代化》 2003年第12期62-64,共3页
分析了Win32.SQLExp.Worm蠕虫病毒原理,并给出相应解决方案。
关键词 蠕虫病毒 Win32.SQLExp.worm 缓冲区溢出 计算机病毒 网络安全 防火墙
下载PDF
模拟Worms的游戏设计与实现
14
作者 陈英雪 王显德 《吉林化工学院学报》 CAS 2013年第1期64-69,共6页
本课题的目标是仿照Team17的Worms2D系列游戏产品,开发一款2D游戏,了解整个游戏开发流程,设计一款2D游戏引擎,封装了Direct3D9的部分图形绘制接口、图形控制接口、音效接口,并在此基础上实现一款2D射击游戏.
关键词 DIRECT 3D worm 接口
下载PDF
介孔Worm-like孔壁晶化制备微孔-介孔分子筛研究
15
作者 徐玲 张强 +5 位作者 陈衍川 周耿旭 高新 张淼 李丹丹 刘宗瑞 《大连理工大学学报》 EI CAS CSCD 北大核心 2018年第6期559-563,共5页
采用水热孔壁晶化法,以Worm-like介孔分子筛为硅源,十八水合硫酸铝为铝源,制备不同硅铝比微孔-介孔ZSM-5复合分子筛,XRD、FT-IR、N2吸附-脱附、TEM等表征结果证明,用此方法成功制备出一系列微孔-介孔ZSM-5复合分子筛.将一系列复合分子... 采用水热孔壁晶化法,以Worm-like介孔分子筛为硅源,十八水合硫酸铝为铝源,制备不同硅铝比微孔-介孔ZSM-5复合分子筛,XRD、FT-IR、N2吸附-脱附、TEM等表征结果证明,用此方法成功制备出一系列微孔-介孔ZSM-5复合分子筛.将一系列复合分子筛用于催化苯酚叔丁基化反应,在反应温度145℃、n(苯酚)∶n(叔丁醇)=1∶2.5条件下,硅铝比为15、25的复合分子筛有较强的催化活性,苯酚转化率和2,4-二叔丁基苯酚选择性分别超过90%和42%. 展开更多
关键词 微孔-介孔分子筛 worm-like介孔分子筛 孔壁晶化 催化性能
下载PDF
第二代光盘——WORM
16
作者 郑登理 《情报学报》 CSSCI 北大核心 1991年第2期144-150,共7页
关键词 光盘 worm 情报载体
下载PDF
A Potential Approach of Internet Worm Propagation Based on P2P
17
作者 YAO Yu LUG Xingrui GAO Fuxiang YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1711-1714,共4页
Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation a... Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance. 展开更多
关键词 worm P2P (Peer-to-Peer)-based propagation approach SEI (susceptible-exposed-infected) model size of worm
下载PDF
Research and Development of P2P Worms
18
作者 Li You Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第3期202-210,共9页
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ... With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail. 展开更多
关键词 Index Terms---Peer-to-peer (P2P) P2P worm worm propagation model.
下载PDF
Modeling and analysis of gradual hybrid anti-worm
19
作者 李军群 秦拯 +3 位作者 欧露 O.Salman A.X.Liu 杨金民 《Journal of Central South University》 SCIE EI CAS 2011年第6期2050-2055,共6页
The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering maliciou... The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW. 展开更多
关键词 network security internet worm anti-worm vulnerable host propagation model
下载PDF
Novel IOV worm model and its corresponding hybrid anti-worm strategy in expressway interchange terminal
20
作者 汪峥 钱焕延 +2 位作者 汪婧雅 高嵩 徐延贵 《Journal of Central South University》 SCIE EI CAS 2013年第5期1259-1268,共10页
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina... In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead. 展开更多
关键词 intemet of vehicles worm propagation model hybrid anti-worm strategy EXPRESSWAY interchange terminal
下载PDF
上一页 1 2 165 下一页 到第
使用帮助 返回顶部