期刊文献+
共找到84篇文章
< 1 2 5 >
每页显示 20 50 100
Application of meta-learning in cyberspace security:a survey 被引量:1
1
作者 Aimin Yang Chaomeng Lu +4 位作者 Jie Li Xiangdong Huang Tianhao Ji Xichang Li Yichao Sheng 《Digital Communications and Networks》 SCIE CSCD 2023年第1期67-78,共12页
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require... In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized. 展开更多
关键词 META-LEARNING cyberspace security Machine learning Few-shot learning
下载PDF
Cyberspace的建模与仿真研究综述 被引量:7
2
作者 胡晓峰 王艳正 司光亚 《中国电子科学研究院学报》 2011年第3期226-229,共4页
概括了Cyberspace建模的新特点,介绍了三个典型的Cyberspace仿真系统,分别是用于社会域电力控制系统分析的虚拟控制系统环境、支持美国国家Cyber安全研究的国家Cyber靶场和用于军事领域通信网络分析的网络作战仿真系统。旨在为开展Cyber... 概括了Cyberspace建模的新特点,介绍了三个典型的Cyberspace仿真系统,分别是用于社会域电力控制系统分析的虚拟控制系统环境、支持美国国家Cyber安全研究的国家Cyber靶场和用于军事领域通信网络分析的网络作战仿真系统。旨在为开展Cyberspace建模与仿真提供相关实践参考。 展开更多
关键词 cyberspace 网络 建模与仿真
下载PDF
网络空间(Cyberspace)及其认识 被引量:6
3
作者 于文震 《现代雷达》 CSCD 北大核心 2010年第8期1-7,共7页
分析美军在网络空间(Cyberspace)方面的最新研究进展、美国国防部的职能和任务使命分析、2010年度的《四年防务评估报告》在Cyberspace方面的有关内容研究,探讨了美军成立网络司令部的动因,便于正确认识Cyberspace及其特点,有效开发和利... 分析美军在网络空间(Cyberspace)方面的最新研究进展、美国国防部的职能和任务使命分析、2010年度的《四年防务评估报告》在Cyberspace方面的有关内容研究,探讨了美军成立网络司令部的动因,便于正确认识Cyberspace及其特点,有效开发和利用Cyberspace。结合雷达技术发展趋势,提出了Cyberspace中雷达系统的功能及技术构架。 展开更多
关键词 cyberspace 泛在网 网络司令部 网络战
下载PDF
Cyberspace Endogenous Safety and Security 被引量:3
4
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 cyberspace endogenous security problem Uncertain threat cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
Cyberspace的关键技术研究综述
5
作者 张洪涛 王甜甜 +1 位作者 马培军 苏小红 《哈尔滨工业大学学报(社会科学版)》 2011年第5期6-9,共4页
Cyberspace与陆、海、空、天并列为五大作战空间,未来战争是在Cyberspace内的体系对抗。只有大力发展新一代信息理论和技术,才能在Cyber战中抢占制高点。分析Cyberspace的内涵及研究现状,从Cy-ber安全、Cyber战两个方面论述了Cyberspac... Cyberspace与陆、海、空、天并列为五大作战空间,未来战争是在Cyberspace内的体系对抗。只有大力发展新一代信息理论和技术,才能在Cyber战中抢占制高点。分析Cyberspace的内涵及研究现状,从Cy-ber安全、Cyber战两个方面论述了Cyberspace的关键技术,提出应加强以Cyber安全和Cyber战为基础的应用研究,应加强自主创新,大力发展新一代信息理论和技术,在Cyber战中抢占制高点。 展开更多
关键词 cyberspace Cyber安全 Cyber战
下载PDF
Cyberspace与网络教育关联分析
6
作者 张华新 张帆 《华中农业大学学报(社会科学版)》 2003年第2期88-91,共4页
从Cyberspace对网络教育的工具性功能出发 ,对Cyberspace的开放性、虚拟性、自治性等特性进行了深入的分析 ,阐明了Cyberspace与网络教育的关系 ,指出了强化网络教育管理的必要性和紧迫性。
关键词 信息时代 cyberspace 赛伯空间 网络空间 虚拟世界 网络教育 关联 开放性 虚拟性 自治性
下载PDF
基于引文网络的Cyberspace研究进展
7
作者 陈晓慧 马一薇 刘媛媛 《测绘与空间地理信息》 2014年第12期6-10,共5页
以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点... 以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点和学科分布;从地理学角度,揭示了该领域的研究热点和方向. 展开更多
关键词 cyberspace CITESPACE 知识图谱 可视化
下载PDF
多媒体技术漫谈——CYBERSPACE——赛百空间
8
作者 温立新 《电脑》 1996年第10期11-13,共3页
一、概念Cyberspace一词是美国科幻作家Willian Gibson创造的.1984年Gibson在他的小说《Neuromancer》中对Cyberspace进行了描绘:Cyberspace是现实世界的仿真,人们用一段电缆插入与大脑固定连接的插座,使大脑与计算机连接,进入Cyberspa... 一、概念Cyberspace一词是美国科幻作家Willian Gibson创造的.1984年Gibson在他的小说《Neuromancer》中对Cyberspace进行了描绘:Cyberspace是现实世界的仿真,人们用一段电缆插入与大脑固定连接的插座,使大脑与计算机连接,进入Cyberspace,就可以经历真实世界中的各种体验.幻想故事中的Cyberspace,如海市蜃楼,令人神往而又深不可测.现在科学家借用Cyberspace来称呼“存放信息和概念集合的空间”,Cyberspace中文可称为“ 展开更多
关键词 多媒体 cyberspace 仿真 信息处理
下载PDF
建议把cyberspace译成“控域”
9
作者 汪成为 《中国科技术语》 2014年第6期19-20,共2页
在2014年4月15日的中央国家安全委员会第一次会议上,习近平主席指出:当前我国国家安全的“内涵和外延比历史上任何时候都要丰富,时空领域比历史上任何时候都要宽广,内外因素比历史上任何时候都要复杂”。
关键词 cyberspace 安全委员会 国家安全 历史 习近平
下载PDF
“Cyberspace” or “Cyber warfare”研究热点与趋势分析
10
作者 郑涛 李自力 +2 位作者 赵小强 郝烺超 谭跃进 《现代情报》 CSSCI 2013年第11期119-130,共12页
运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿... 运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。 展开更多
关键词 CitespaceⅡ cyberspace CYBER warfare 网络空间 网络战 赛博空间 赛博战 研究热点 研究趋势
下载PDF
理解和研究Cyberspace 被引量:13
11
作者 徐伯权 王珩 周光霞 《指挥信息系统与技术》 2010年第1期23-26,共4页
Cyberspace已成为类似于陆、海、空、天等领域真实存在的一个全新作战领域,是当前各军事强国发展和建设的热点之一。认识、研究和发展Cyberspace,对于保护我军Cyberspace的安全、获取Cyberspace作战优势具有重要意义。文中从概念内涵、... Cyberspace已成为类似于陆、海、空、天等领域真实存在的一个全新作战领域,是当前各军事强国发展和建设的热点之一。认识、研究和发展Cyberspace,对于保护我军Cyberspace的安全、获取Cyberspace作战优势具有重要意义。文中从概念内涵、发展现状等方面阐述Cyberspace,提出Cyberspace的研究方向和关键技术,并给出措施和建议。 展开更多
关键词 cyberspace Cyber作战 Cyber安全 信息基础设施
下载PDF
Anti-Attacking Modeling and Analysis of Cyberspace Mimic DNS 被引量:1
12
作者 Lei He Quan Ren +2 位作者 Bolin Ma Weili Zhang Jiangxing Wu 《China Communications》 SCIE CSCD 2022年第5期218-230,共13页
With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper ... With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy. 展开更多
关键词 cyberspace mimic DNS generalized stochastic Petri net anti-attacking MODELING performance
下载PDF
The New Trend:US’Strengthening Dominance in Cyberspace 被引量:1
13
作者 Li Yan 《Contemporary International Relations》 2020年第6期68-85,共18页
With its advantages in technological innovation,industrial leadership,and international influence,the United States(US)has long dominated cyberspace.However,with the evolution of international power structures,competi... With its advantages in technological innovation,industrial leadership,and international influence,the United States(US)has long dominated cyberspace.However,with the evolution of international power structures,competition for power in cyberspace has intensified,thereby bringing unprecedented challenges to the US’dominance.Cyberspace has become an increasingly important battleground,especially in the context of Sino-US strategic competition.To maintain its advantages and safeguard national interests,the US government has made continuous efforts to explore and consolidate cyberspace power from three dimensions—adjusting ideologies,strengthening capabilities,and seeking institutional power.These trends will have profound impacts on the future development of,and power structures in,cyberspace. 展开更多
关键词 United States cyberspace DOMINANCE
下载PDF
Research on the Construction of a Novel Cyberspace Security Ecosystem 被引量:3
14
作者 Xiao-Niu Yang Wei Wang +2 位作者 Xiao-Feng Xu Guo-Rong Pang Chun-Lei Zhang 《Engineering》 2018年第1期47-52,共6页
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos... Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infras- tructure networks (K space), based on their individual characteristics. The features and security require- ments of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for "situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback") loop for constructing a cyberspace security ecosys- tem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active manage- ment, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence. 展开更多
关键词 cyberspace SECURITY ECOSYSTEM SMCRC LOOP TRIPARTITE THEORY of cyberspace
下载PDF
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism 被引量:1
15
作者 Junjie Xu 《Journal of Computer and Communications》 2021年第7期1-7,共7页
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy... With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense. 展开更多
关键词 cyberspace Mimic Defense Dynamic Heterogeneous Redundancy Structure Defense Technology Network Security
下载PDF
Cyberspace的译名探讨
16
作者 宫力 《科技术语研究》 2001年第1期25-26,共2页
关键词 计算机科学 名词术语 cyberspace 翻译 英译汉 网上空间
下载PDF
Study on Optimization of Earthquake Emergency Traffic Scheduling Based on The Lifting of Cyberspace
17
作者 ZHANG Peng 《China Communications》 SCIE CSCD 2015年第S2期138-143,共6页
How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescu... How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescue to the non victims. Using cyberspace of lifeline network traffic and emergency transportation problem, considering the network restoration problem of disaster area, earthquake emergency supplies distribution model is established. In the model, to consider the need to repair the damaged sections and the existing emergency rescue generated traffic volume of emergency rescue network effects. And design heuristic algorithm for solving the model. Finally the example shows that in emergency rescue, emergency rescue of critical damage repair the road and traffic control of the whole lifeline network rescue efficiency highest, with the average nuisance greatly reduce, the lifeline network connectivity reliability. 展开更多
关键词 earthquake DISASTER EMERGENCY TRAFFIC cyberspace TRAFFIC control road reconstruction HEURISTIC algorithm
下载PDF
CAT in Cyberspace——浅谈网络时代的计算机辅助翻译 被引量:1
18
作者 骆幼丁 《四川教育学院学报》 2005年第B05期173-175,共3页
关键词 计算机辅助翻译 cyberspace CAT 网络时代 计算机辅助教学 计算机辅助设计 计算机辅助制造 in 摄影技术
下载PDF
Global Governance in Cyberspace: Process,Conflict and China’s Proposals
19
作者 Wang Jiayi 《学术界》 CSSCI 北大核心 2020年第6期226-234,共9页
In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivat... In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation. 展开更多
关键词 cyberspace global governance sovereign state international rule of law
下载PDF
Global Cyberspace Governance: State Actors and the China-US Cyber Relationship
20
作者 Li Yan 《Contemporary International Relations》 2019年第2期105-124,共20页
The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cy... The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cyber capacities,and getting more involved in global cyberspace governance.This process will be determined upon the interactions of China and the US to be framed within the laws and regulations of global cyberspace governance. 展开更多
关键词 cyberspace GLOBAL GOVERNANCE Sino-US relations
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部