期刊文献+
共找到20,816篇文章
< 1 2 250 >
每页显示 20 50 100
Seasonal increase in nest defense,but not egg rejection,in a cuckoo host 被引量:1
1
作者 Bo Zhou Wei Liang 《Avian Research》 SCIE CSCD 2024年第1期50-54,共5页
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ... The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality. 展开更多
关键词 AGGRESSION Anti-parasite strategy Egg rejection Mismatch cuckoo parasitism Nest defense
下载PDF
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
2
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Starlet:Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT
3
作者 Hui Xia Ning Huang +2 位作者 Xuecai Feng Rui Zhang Chao Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第3期586-596,共11页
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ... The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility. 展开更多
关键词 Internet of things defense resource sharing Multi-armed bandits defense resource allocation
下载PDF
基于DoDAF的低慢小飞行器综合处置体系架构设计 被引量:1
4
作者 卫继承 张娟 +2 位作者 杨文雅 马岚岭 张航 《系统工程与电子技术》 EI CSCD 北大核心 2024年第1期162-172,共11页
针对低慢小飞行器在综合处置中威胁环境复杂、多学科关键技术交互密切等现状,引入美国国防部体系架构框架(Department of Defense Architecture Framework,DoDAF)对低慢小飞行器综合处置体系进行顶层设计。对其视角视图进行“补充、裁... 针对低慢小飞行器在综合处置中威胁环境复杂、多学科关键技术交互密切等现状,引入美国国防部体系架构框架(Department of Defense Architecture Framework,DoDAF)对低慢小飞行器综合处置体系进行顶层设计。对其视角视图进行“补充、裁剪、融合”,定义了各视角的建模顺序及各视角下视图的建模方法,形成一套面向各类复杂体系分析与设计问题完备的构建方法及一套体系架构快速设计方法。并以一种新型多元载荷协同作战的低慢小飞行器综合处置体系进行建模与仿真,验证了该方法能为低慢小飞行器的综合处置作战提供系统全面的描述和可靠的概念模型支撑、该模型可为作战体系架构设计与装备技术发展提供牵引。 展开更多
关键词 低慢小飞行器 美国国防部体系架构框架 基于模型的体系工程 架构设计
下载PDF
A Function-Aware Mimic Defense Theory and Its Practice
5
作者 He Jiajun Yuan Yali +3 位作者 Liang Sichu Fu Jiale Zhu Hongyu Cheng Guang 《China Communications》 SCIE CSCD 2024年第8期192-210,共19页
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach... In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense. 展开更多
关键词 Bayesian theory CONFIDENCE functional implementation mimic defense
下载PDF
Plant Chemical Defenses against Insect Herbivores—Using theWild Tobacco as a Model
6
作者 Guangwei Sun Xuanhao Zhang +4 位作者 Yi Liu Liguang Chai Daisong Liu Zhenguo Chen Shiyou Lü 《Phyton-International Journal of Experimental Botany》 SCIE 2024年第4期641-659,共19页
The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has develope... The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops. 展开更多
关键词 TOBACCO HERBIVORE chemical defense jasmonic acid REGULATION
下载PDF
A shield of defense:Developing ballistic composite panels with effective electromagnetic interference shielding absorption
7
作者 Nisrin Rizek Abdelal 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期123-136,共14页
The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through a... The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense. 展开更多
关键词 BALLISTIC FRP composite EMI shielding ABSORPTIVITY CT-SCAN NIJ test BULLET defense
下载PDF
基于DoDAF的反无人机装备体系结构建模
8
作者 唐召胜 《兵工自动化》 北大核心 2024年第8期55-59,共5页
针对当前反无人机作战研究热点,以要地反无人机装备体系需求分析为输入,基于美国国防部体系结构框架(department of defense architecture framework,DoDAF)标准,采用基于模型的体系架构(model-based systems engineering,MBSE)设计方法... 针对当前反无人机作战研究热点,以要地反无人机装备体系需求分析为输入,基于美国国防部体系结构框架(department of defense architecture framework,DoDAF)标准,采用基于模型的体系架构(model-based systems engineering,MBSE)设计方法,构建反无人机装备体系,完成体系结构建模和方法设计,选取典型作战视角和系统视角描述模型,给出较为全面、直观的反无人机装备体系顶层概念框架,可为未来反无人机作战及装备发展提供思路与借鉴。 展开更多
关键词 反无人机 dodAF 要地防护 装备体系 建模
下载PDF
Two intestinal microbiota-derived metabolites, deoxycholic acid and butyrate, synergize to enhance host defense peptide synthesis and alleviate necrotic enteritis
9
作者 Dohyung M.Kim Jing Liu +3 位作者 Melanie A.Whitmore Isabel Tobin Zijun Zhao Guolong Zhang 《Journal of Animal Science and Biotechnology》 SCIE CAS CSCD 2024年第3期1158-1172,共15页
Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,... Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,have independently been shown to induce host defense peptide(HDP)synthesis.However,the potential synergy between these two compounds remains unexplored.Methods To investigate the possible synergistic effect between DCA and butyrate in regulating HDP synthesis and barrier function,we treated chicken HD11 macrophage cells and jejunal explants with DCA and sodium butyrate(NaB),either individually or in combination,for 24 h.Subsequently,we performed RNA isolation and reverse transcrip-tion-quantitative PCR to analyze HDP genes as well as the major genes associated with barrier function.To further determine the synergy between DCA and NaB in enhancing NE resistance,we conducted two independent trials with Cobb broiler chicks.In each trial,the diet was supplemented with DCA or NaB on the day-of-hatch,followed by NE induction through sequential challenges with Eimeria maxima and Clostridium perfringens on d 10 and 14,respectively.We recorded animal mortality after infection and assessed intestinal lesions on d 17.The impact of DCA and NaB on the microbiota in the ileum and cecum was evaluated through bacterial 16S rRNA gene sequencing.Results We found that the combination of DCA and NaB synergistically induced multiple HDP genes in both chicken HD11 cells and jejunal explants.Additionally,the gene for claudin-1,a major tight junction protein,also exhibited synergistic induction in response to DCA and NaB.Furthermore,dietary supplementation with a combination of 0.75 g/kg DCA and 1 g/kg NaB led to a significant improvement in animal survival and a reduction in intestinal lesions compared to either compound alone in a chicken model of NE.Notably,the cecal microbiota of NE-infected chickens showed a marked decrease in SCFA-producing bacteria such as Bacteroides,Faecalibacterium,and Cuneatibacter,with lactobacilli becoming the most dominant species.However,supplementation with DCA and NaB largely restored the intestinal microbiota to healthy levels.Conclusions DCA synergizes with NaB to induce HDP and claudin-1 expression and enhance NE resistance,with potential for further development as cost-effective antibiotic alternatives. 展开更多
关键词 Bile acids Host defense peptides METABOLITES MICROBIOME Necrotic enteritis Short-chain fatty acids
下载PDF
Machine Learning Security Defense Algorithms Based on Metadata Correlation Features
10
作者 Ruchun Jia Jianwei Zhang Yi Lin 《Computers, Materials & Continua》 SCIE EI 2024年第2期2391-2418,共28页
With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The networ... With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data. 展开更多
关键词 Data-oriented architecture METADATA correlation features machine learning security defense data source integration
下载PDF
Adversarial attacks and defenses for digital communication signals identification
11
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
下载PDF
Multifunctional HDPE/Cu biocidal nanocomposites for MEX additive manufactured parts: Perspectives for the defense industry
12
作者 Nectarios Vidakis Nikolaos Michailidis +7 位作者 Markos Petousis Nektarios K.Nasikas Vassilios Saltas Vassilis Papadakis Nikolaos Mountakis Apostolos Argyros Mariza Spiridaki Ioannis Valsamos 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第8期16-32,共17页
In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0... In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum. 展开更多
关键词 High-density polyethylene(HDPE) Copper(Cu) Material extrusion(MEX) Mechanical performance Electrical properties ANTIBACTERIAL defense and security
下载PDF
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
13
作者 Chirag Ganguli Shishir Kumar Shandilya +1 位作者 Michal Gregus Oleh Basystiuk 《Computer Systems Science & Engineering》 2024年第3期739-758,共20页
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori... Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. 展开更多
关键词 Artificial bee colonization adaptive defense cyber attack nature inspired cyber security cyber security cyber physical infrastructure
下载PDF
Effective Utilization of Government-Provided CTI by Small Businesses within the Defense Industrial Base
14
作者 Josiah Dykstra Lawrence A. Gordon +2 位作者 Martin P. Loeb Benjamin Wall Lei Zhou 《Journal of Information Security》 2024年第2期196-217,共22页
There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small... There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack. 展开更多
关键词 Government-Provided CTI Small Businesses defense Industrial Base
下载PDF
基于DoDAF的铁路营业线施工安全防护体系
15
作者 汤飞 宁雪 +2 位作者 张鹏 杨磊 李金波 《中国铁路》 北大核心 2024年第1期175-183,共9页
铁路营业线施工具有参与专业多、组织规模大、作业交互环境复杂等特点,对施工安全防护提出了很高要求,需以体系化视角对营业线施工安全防护开展系统研究。从铁路营业线施工作业实际出发,基于国防部体系结构框架(DoDAF),以实现铁路营业... 铁路营业线施工具有参与专业多、组织规模大、作业交互环境复杂等特点,对施工安全防护提出了很高要求,需以体系化视角对营业线施工安全防护开展系统研究。从铁路营业线施工作业实际出发,基于国防部体系结构框架(DoDAF),以实现铁路营业线施工安全防护为目标,构建铁路营业线施工DoDAF模型,涵盖全景视图、能力视图、作战视图及系统视图下多个模型,明确施工防护目标、能力、任务、功能等核心要素,形成完整的施工安全防护体系,为铁路营业线施工安全防护顶层设计提供新的借鉴思路。 展开更多
关键词 铁路营业线施工 施工安全防护 防护体系 国防部体系结构框架 dodAF
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
16
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface defense-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered defense Lockheed Martin Kill Chain Proactive defense Redundancy Risk Management Threat Intelligence
下载PDF
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
17
作者 Parijat Rai Saumil Sood +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期43-68,共26页
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist... This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner. 展开更多
关键词 Large Language Models (LLMs) Adversarial Attack Prompt Injection Filter defense Artificial Intelligence Machine Learning CYBERSECURITY
下载PDF
基于DoDAF的蜂群无人机防空压制作战体系研究
18
作者 史志富 《郑州航空工业管理学院学报》 2024年第2期5-13,共9页
蜂群作战模式是小型无人机未来颠覆性作战模式之一,利用蜂群无人机对对方防空系统进行压制是蜂群无人机的主要应用样式之一。为有效保障和指导防空压制任务的执行,必须针对蜂群无人机的使用模式和应用场景建立其顶层的体系架构。针对空... 蜂群作战模式是小型无人机未来颠覆性作战模式之一,利用蜂群无人机对对方防空系统进行压制是蜂群无人机的主要应用样式之一。为有效保障和指导防空压制任务的执行,必须针对蜂群无人机的使用模式和应用场景建立其顶层的体系架构。针对空中发射蜂群无人机进行防空压制的应用场景,根据美国国防部体系架构框架提供的标准和方法,构建了大型运输机从空中投放蜂群无人机执行防空压制/对地攻击等作战任务的体系架构,给出了体系架构的建模流程,并从作战概念、组织过程、作战活动、信息交互关系以及资源流等不同视角和层次建立了相应的视图模型,可为未来大型运输机空投蜂群无人机进行蜂群应用研究提供借鉴。 展开更多
关键词 防空压制 蜂群无人机 国防部体系架构框架 体系架构
下载PDF
基于DoDAF的水面舰艇对空自防御系统设计
19
作者 杨光 梁琨 沈海伟 《火力与指挥控制》 CSCD 北大核心 2024年第1期182-189,共8页
针对水面舰艇对空自防御系统需求,基于DoDAF体系结构框架,从作战视图、能力视图以及系统视图三类视图入手,分析了水面舰艇对空自防御系统设计步骤,结合自防御作战流程,构建水面舰艇对空自防御系统模型,对水面舰艇对空自防御系统体系结... 针对水面舰艇对空自防御系统需求,基于DoDAF体系结构框架,从作战视图、能力视图以及系统视图三类视图入手,分析了水面舰艇对空自防御系统设计步骤,结合自防御作战流程,构建水面舰艇对空自防御系统模型,对水面舰艇对空自防御系统体系结构及其信息交互进行了分析,明确系统要素间相互关系,开展体系结构模型验证试验,试验结果表明,设计的体系结构模型与预期一致,研究结果可为舰艇对空自防御系统顶层设计优化和风险控制提供理论支持。 展开更多
关键词 dodAF 自防御系统 体系结构 模型验证
下载PDF
基于DoDAF的航空装备智能保障系统体系结构建模
20
作者 苗学问 董骁雄 +2 位作者 钱征文 胡杨 李牧东 《系统工程与电子技术》 EI CSCD 北大核心 2024年第2期640-648,共9页
保障系统结构建模是发展和构建新一代航空装备智能保障系统的重要基础。航空装备保障系统涉及保障要素多、交联关系复杂,需从系统工程的角度开展顶层设计,并采用统一的结构框架对其体系结构进行建模表征。引入美国国防部架构框架(Depart... 保障系统结构建模是发展和构建新一代航空装备智能保障系统的重要基础。航空装备保障系统涉及保障要素多、交联关系复杂,需从系统工程的角度开展顶层设计,并采用统一的结构框架对其体系结构进行建模表征。引入美国国防部架构框架(Departmeant of Defense Architecture Framework,DoDAF)体系结构框架,提出基于“概念-任务-能力”的体系结构开发序列,构建航空装备智能保障系统的能力、保障活动、各保障要素的信息交互及组织关系等视图模型,得到“能力层-需求层-技术层”之间的对应关系。该方法能够全面地描述航空装备智能保障系统体系结构,提高不同保障要素之间的互操作性,并将其转化为具体的设计要求,可为航空装备智能保障系统开发提供支持。 展开更多
关键词 航空装备 智能保障系统 美国国防部架构框架 基于模型的系统工程
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部