期刊文献+
共找到6,939篇文章
< 1 2 250 >
每页显示 20 50 100
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
1
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Distributed Application Addressing in 6G Network
2
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&Network Convergence) DNS(Domain Name System) ICN(Information-Centric Network) 6G
下载PDF
Application Strategies of Automatic Addressable Single-Lamp Control Technology in Tunnel Lighting
3
作者 Huiyan Yang 《Journal of World Architecture》 2024年第2期90-95,共6页
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste... The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively. 展开更多
关键词 Tunnel lighting Automatic addressable single-lamp control technology System design Cascade control
下载PDF
异构系统集成中基于WS-Addressing的消息安全转发方案 被引量:1
4
作者 刘云生 柳轶 《计算机应用研究》 CSCD 北大核心 2006年第12期162-164,共3页
由于W eb Services原有的消息寻址规范WS-Routing存在安全隐患,W3C制定了WS-Addressing规范,用于替代WS-Routing。提出一种基于WS-Addressing规范的解决方案,使用一致的寻址模式发送事件消息来实现消息级的安全,提高异构系统集成的安全性。
关键词 WS-addressing WS-Referral WEB SERVICE 消息转发 集成
下载PDF
基于OSPF协议的NSSA-External-LSA携带Forwording Address的优化 被引量:5
5
作者 王琦进 经默然 《西华大学学报(自然科学版)》 CAS 2018年第2期51-57,共7页
为进一步优化路由,提高网络传输效率,研究了OSPF V2协议的NSSA-External-LSA携带Forwording Address(FA)地址的优化机制,提出并解决了NSSA-External-LSA携带FA地址后不能进行路径优化及外部路由无法计算的问题。仿真实验结果表明,优化后... 为进一步优化路由,提高网络传输效率,研究了OSPF V2协议的NSSA-External-LSA携带Forwording Address(FA)地址的优化机制,提出并解决了NSSA-External-LSA携带FA地址后不能进行路径优化及外部路由无法计算的问题。仿真实验结果表明,优化后的OSPF路径更优,路由传输效率更高。 展开更多
关键词 OSPF 路径优化 NSSA-External-LSA FA地址
下载PDF
基于WS-addressing构建SOAP消息调用 被引量:1
6
作者 华进 钱雪忠 《计算机工程与设计》 CSCD 北大核心 2007年第4期839-841,共3页
Web服务寻址定义了一种新的规范,为标准化指定Web服务的位置提供了方法。介绍了Web服务寻址的主要框架,并通过具体的例子详细展示了如何使用WS-addressing规范构建SOAP消息调用;在此基础上进一步分析了基于Web服务寻址实现SOAP消息的异... Web服务寻址定义了一种新的规范,为标准化指定Web服务的位置提供了方法。介绍了Web服务寻址的主要框架,并通过具体的例子详细展示了如何使用WS-addressing规范构建SOAP消息调用;在此基础上进一步分析了基于Web服务寻址实现SOAP消息的异步传输和跨多种协议传输;讨论了Web服务寻址对未来Web服务产生的深远影响。 展开更多
关键词 WEB服务 Web服务寻址 SOAP消息 消息信息头 端点引用 异步传输
下载PDF
On the Analysis of the Address Term"老师" in General Use
7
作者 高岩 《英语广场(学术研究)》 2012年第5期40-43,共4页
The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out t... The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors. 展开更多
关键词 address TERM GENERAL USE 老师
下载PDF
基于OSPF协议的AS-External-LSA携带Forwording Address的优化研究
8
作者 王琦进 经默然 《辽宁工业大学学报(自然科学版)》 2018年第2期89-93,共5页
OSPF的优化机制在应用中不断增加和完善。本文在分析OSPFv2协议的AS-External-LSA携带FA地址机制的基础上,通过设计场景、抓包分析,研究了用FA地址优化AS-External-LSA路径的过程和原理。仿真实验表明优化后的OSPF路由路径更优,路由传... OSPF的优化机制在应用中不断增加和完善。本文在分析OSPFv2协议的AS-External-LSA携带FA地址机制的基础上,通过设计场景、抓包分析,研究了用FA地址优化AS-External-LSA路径的过程和原理。仿真实验表明优化后的OSPF路由路径更优,路由传输效率更高。 展开更多
关键词 OSPF 路径优化 AS-External-LSA FA地址
下载PDF
On Barack Obama's Inaugural Address——A Systemic Functional Perspective
9
作者 王春梅 《海外英语》 2012年第19期253-256,共4页
Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspe... Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined. 展开更多
关键词 Obama’s inaugural address metafunction SFL
下载PDF
An Analysis of Different Addressing Terms in High Context Communication and Low Context Communication from the Perspective of Frame Theory
10
作者 刘鹏丽 《海外英语》 2014年第14期44-45,共2页
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A... Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory. 展开更多
关键词 addressING TERMS titles HCC LCC
下载PDF
A Study of Pragmatic Failure of Address Forms in Cross-cultural Communication
11
作者 孙美玮 《海外英语》 2012年第18期241-242,共2页
As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study a... As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved. 展开更多
关键词 CROSS-CULTURE COMMUNICATION address FORMS pragmati
下载PDF
Analysis of Gettysburg Address
12
作者 左晓丹 《海外英语》 2012年第13期263-264,共2页
In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to ex... In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar. 展开更多
关键词 DISCOURSE ANALYSIS Gettysburg address FUNCTIONAL g
下载PDF
A Contrastive Study of Honorific and Depreciatory Address Forms in Chinese,English and Japanese
13
作者 田艳萍 《科技信息》 2010年第27期I0206-I0207,共2页
Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the... Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the choice of them. This paper is firstly to make a contrastive analysis of honorific and depreciatory address forms in Chinese, English and Japanese, then explore the different basic values in Chinese, American and Japanese culture and discuss their influences on honorific and depreciatory address forms in the hope of a better understanding of their pragmatic and cultural differences and an avoidance of miscommunication in intercultural interactions. 展开更多
关键词 英语教学 教学方法 阅读 文化心理
下载PDF
A Comparison of Address Forms in American English and Chinese
14
作者 孔莎 《科技信息》 2009年第18期118-118,120,共2页
As one of the most frequently used language forms in people's daily communication,the address form carries many different social semantic meanings. This paper aims to compare western and eastern cultures through a... As one of the most frequently used language forms in people's daily communication,the address form carries many different social semantic meanings. This paper aims to compare western and eastern cultures through a tentative study of address forms in American English and Chinese. By finding their similarities and differences it will explore the deep structures of each culture. 展开更多
关键词 中国 美国 地址 文化差异
下载PDF
UDDI和WS-Addressing共存的Web服务模型
15
作者 彭立 《微计算机信息》 2011年第4期142-144,共3页
WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Ad... WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。 展开更多
关键词 统一描述 发现和集成 WS-addressing WEB服务模型 端点引用 工厂服务
下载PDF
Analysis on the Cohesive and Coherent Features of John Kennedy's First Inaugural Address
16
作者 范莹芳 《海外英语》 2013年第2X期224-228,共5页
John Kennedy's first inaugural address is one of the widely appreciated speeches worldwide. It is famous not only for calling up the American people to well serve the country, but also for its extraordinary lingui... John Kennedy's first inaugural address is one of the widely appreciated speeches worldwide. It is famous not only for calling up the American people to well serve the country, but also for its extraordinary linguistic power to arouse the listeners' emotions, which lies to a great extent in the marvelous employment of the cohesive and coherent devices in the process of its delivery. Cohesion and coherence are two elementary and significant concepts in the theoretical system of discourse analysis. There-fore, they play an important role in the structuring, arrangement, interpretation and analysis of a discourse. In this sense, it is significant to analyze the cohesive and coherent features of John Kennedy's first inaugural address in order to obtain a penetrating comprehension of the speech in many aspects. A detailed analysis on the cohesive and coherent features of the speech has been conducted in this paper. In the aspect of cohesion in the address, the devices employed fall into two categories: structural cohesion and non-structural cohesion. Structural cohesive devices used in the discourse are mainly grammatical cohesion and lexical cohesion like repetition, ellipsis, conjunction, etc. Non-structural methods adopted in the speech are transitivity, mood and modality, thematic progression, parallel structure and so on. In the aspect of coherence, five levels of coherent methods have been employed, namely, lexical level, syntax level, semantic level, phonological level and social semiotic level. The neat intermingling of the cohesive and coherent methods function cooperatively and lead to the smooth going of the text. 展开更多
关键词 COHESIVE COHERENT John Kennedy’s FIRST inaugural a
下载PDF
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen 被引量:7
17
作者 Lejun Zhang Zhijie Zhang +4 位作者 Weizheng Wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期597-616,共20页
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T... As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain. 展开更多
关键词 Covert communication blockchain Bitcoin address
下载PDF
An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks 被引量:2
18
作者 Idrees Sarhan Kocher 《Computers, Materials & Continua》 SCIE EI 2022年第5期3821-3838,共18页
Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers ... Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study. 展开更多
关键词 addressing\Naming MAC address global address locally unique address tree spanning clustering duplicate address detection(DAD)
下载PDF
Content Addressable Storage Optimization for Desktop Virtualization Based Disaster Backup Storage System 被引量:3
19
作者 Ruan Li Xiao Lim in Zhu Mingfa 《China Communications》 SCIE CSCD 2012年第7期1-13,共13页
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage 展开更多
关键词 disaster backup desktop virtualization storage optimization content addressable storage
下载PDF
Addressing the public health concerns of physical inactivity, low levels of fitness, and unhealthy weight among Chinese school-aged children 被引量:2
20
作者 Fuzhong Li Peijie Chen 《Journal of Sport and Health Science》 SCIE 2017年第4期379-380,共2页
In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic re... In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic reforms, however, have brought major changes in social, economic. 展开更多
关键词 addressing the public healthlow levels of fimess unhealthy weight
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部