期刊文献+
共找到946篇文章
< 1 2 48 >
每页显示 20 50 100
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification
1
作者 Qinyue Wu Hui Xu Mengran Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4091-4107,共17页
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi... Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification. 展开更多
关键词 Network security network traffic identification data analytics feature selection dung beetle optimizer
下载PDF
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
2
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 security risk factor identification Heterogeneous data Grey relational analysis model Relational degree Information entropy Conditional entropy Small reservoir GUANGXI
下载PDF
Security Risk Analysis Model for Identification and Resolution System of Industrial Internet
3
作者 MA Baoluo CHEN Wenqu CHI Cheng 《ZTE Communications》 2020年第1期49-54,共6页
Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if th... Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if the identification and resolution system is attacked.Moreover,it may become a threat to national security.Therefore,security plays an important role in identification and resolution system of the industrial Internet.In this paper,an innovative security risk analysis model is proposed for the first time,which can help control risks from the root at the initial stage of industrial Internet construction,provide guidance for related enterprises in the early design stage of identification and resolution system of the industrial Internet,and promote the healthy and sustainable development of the industrial identification and resolution system. 展开更多
关键词 industrial Internet identification and resolution system security risk analysis model
下载PDF
Radio Frequency Fingerprint-Based Satellite TT&C Ground Station Identification Method
4
作者 Xiaogang Tang Junhao Feng +1 位作者 Binquan Zhang Hao Huan 《Journal of Beijing Institute of Technology》 EI CAS 2023年第1期1-12,共12页
This study presents a radio frequency(RF)fingerprint identification method combining a convolutional neural network(CNN)and gated recurrent unit(GRU)network to identify measurement and control signals.The proposed alg... This study presents a radio frequency(RF)fingerprint identification method combining a convolutional neural network(CNN)and gated recurrent unit(GRU)network to identify measurement and control signals.The proposed algorithm(CNN-GRU)uses a convolutional layer to extract the IQ-related learning timing features.A GRU network extracts timing features at a deeper level before outputting the final identification results.The number of parameters and the algorithm’s complexity are reduced by optimizing the convolutional layer structure and replacing multiple fully-connected layers with gated cyclic units.Simulation experiments show that the algorithm achieves an average identification accuracy of 84.74% at a -10 dB to 20 dB signal-to-noise ratio(SNR)with fewer parameters and less computation than a network model with the same identification rate in a software radio dataset containing multiple USRP X310s from the same manufacturer,with fewer parameters and less computation than a network model with the same identification rate.The algorithm is used to identify measurement and control signals and ensure the security of the measurement and control link with theoretical and engineering applications. 展开更多
关键词 measurement and control security radio frequency(RF)fingerprinting identity identification deep learning
下载PDF
Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network
5
作者 Lei Feng Bo Wang +2 位作者 Fuqi Ma Hengrui Ma Mohamed AMohamed 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1487-1501,共15页
As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk dete... As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods. 展开更多
关键词 security risk management key links identifications electric power operation spatiotemporal mixing convolution neural network MobileNet network
下载PDF
A roadmap for security challenges in the Internet of Things 被引量:7
6
作者 Arbia Riahi Sfar Enrico Natalizio +1 位作者 Yacine Challal Zied Chtourou 《Digital Communications and Networks》 SCIE 2018年第2期118-137,共20页
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent object... Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications. 展开更多
关键词 Internet of Things Systemic and cognitive approach security PRIVACY Trust identification Access control
下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
7
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography Internet of Things radio frequency identification security system trusting system.
下载PDF
Security and privacy threats in RFID traceability network 被引量:1
8
作者 Chu Chao-Hsien 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期132-135,共4页
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic... To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented. 展开更多
关键词 traceability network radio frequency identification (RFID) security protocol privacy protection strategy
下载PDF
Leveraging Active Decremental TTL Measuring for Flexible and Efficient NAT Identification 被引量:1
9
作者 Tao Yang Chengyu Wang +3 位作者 Tongqing Zhou Zhiping Cai Kui Wu Bingnan Hou 《Computers, Materials & Continua》 SCIE EI 2022年第3期5179-5198,共20页
Malicious attacks can be launched by misusing the network address translation technique as a camouflage.To mitigate such threats,network address translation identification is investigated to identify network address t... Malicious attacks can be launched by misusing the network address translation technique as a camouflage.To mitigate such threats,network address translation identification is investigated to identify network address translation devices and detect abnormal behaviors.However,existingmethods in this field are mainly developed for relatively small-scale networks and work in an offline manner,which cannot adapt to the real-time inference requirements in high-speed network scenarios.In this paper,we propose a flexible and efficient network address translation identification scheme based on actively measuring the distance of a round trip to a target with decremental time-tolive values.The basic intuition is that the incoming and outgoing traffic froma network address translation device usually experiences the different number of hops,which can be discovered by probing with dedicated time-to-live values.We explore a joint effort of parallel transmission,stateless probes,and flexible measuring reuse to accommodate the efficiency of the measuring process.We further accelerate statistical countingwith a new sublinear space data structure Bi-sketch.We implement a prototype and conduct real-world deployments with 1000 volunteers in 31 Chinese provinces,which is believed to bring insight for ground truth collection in this field.Experiments onmulti-sources datasets show that our proposal can achieve as high precision and recall as 95%with a traffic handling throughput of over 106 pps. 展开更多
关键词 Network address translation NAT security NAT identification active measurement
下载PDF
UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P 被引量:1
10
作者 孙道清 蒲芳 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期475-483,共9页
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne... Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment. 展开更多
关键词 ubiquitous computing identification mechanism UCIMssp SPKI/SDSI Peer-to-Peer security
下载PDF
Research of internet worm warning system based on system identification
11
作者 Tao ZHOU Guanzhong DAI Huimin YE 《控制理论与应用(英文版)》 EI 2006年第4期409-412,共4页
The frequent explosion of Internet worms has been one of the most serious problems in cyberspace security. In this paper, by analyzing the worm's propagation model, we propose a new worm warning system based on the m... The frequent explosion of Internet worms has been one of the most serious problems in cyberspace security. In this paper, by analyzing the worm's propagation model, we propose a new worm warning system based on the method of system identification, and use recursive least squares algorithm to estimate the worm's infection rate. The simulation result shows the method we adopted is an efficient way to conduct Internet worm warning. 展开更多
关键词 Cyberspace security Internet worm System identification Recursive least squares
下载PDF
Evaluation of Sample Taxicab Security Cameras
12
作者 Shengke Zeng Harlan E. Amandus +4 位作者 Alfred A. Amendola Richard S. Current Bradley H. Newbraugh Douglas M. Cantis Darlene Weaver 《Journal of Transportation Technologies》 2017年第4期390-422,共33页
Background: Taxicab drivers have high homicide rates compared to all worker occupations. To help taxi fleets select effective taxicab security cameras, this project tested eight sample taxicab security cameras for det... Background: Taxicab drivers have high homicide rates compared to all worker occupations. To help taxi fleets select effective taxicab security cameras, this project tested eight sample taxicab security cameras for determining their photographic quality which correlated to the effectiveness of in-taxicab facial identification. Methods: Five photographic quality metric thresholds: 1) resolution, 2) highlight dynamic range, 3) shadow dynamic range, 4) lens distortion, and 5) shutter speed, were employed to evaluate the photographic quality of the sample cameras. Waterproof tests and fire-resistive tests on recording memory cards were conducted to determine the memory card survivability in water and simulated fire. Results: The Full-HD (1920 × 1080 pixels), HD (1280 × 720 pixels) and dual-lens VGA (2 × 640 × 480 pixels with wide-angle and telephoto lenses) cameras performed well in resolution tests in daylight conditions. The resolution of a single-lens VGA (640 × 480 pixels) camera did not meet the resolution minimum requirements. All of the recording memory cards passed the five-meter/72-hour waterproof test. A fire resistant chamber made with one fire insulation material could protect a single memory card at 538&degC/1000°F for a five-minute simulated fire test. Conclusions: Single-lens VGA-resolution (640 × 480 pixels) cameras are not suggested for use as security cameras in taxicabs with two or more rows of seats. The recording memory cards can survive 5-meter/72-hour waterproof tests. The memory card chamber built with an existing heat insulation material can protect an individual memory card during 538&degC?(1000°F)/5-minute fire resistance oven-test. 展开更多
关键词 Taxicab HOMICIDE FACIAL identification Taxicab security Camera Tests Resolution Dynamic Range LENS Distortion SHUTTER Speed RECORDING Media Protection
下载PDF
Auto Opening Door and Car Identification
13
作者 Sanner H. Mahmood Oulla G. Hassan +1 位作者 Ayad M. Kwad Safa F. Abass 《Journal of Computer and Communications》 2016年第15期132-141,共10页
Design an Automatic Door System using a unique wireless ID by using infrared ray or Bluetooth technology. That consists of a sensing unit, control unit and drive unit to open and close doors at the entrance of a car t... Design an Automatic Door System using a unique wireless ID by using infrared ray or Bluetooth technology. That consists of a sensing unit, control unit and drive unit to open and close doors at the entrance of a car that has the unique ID. This process is controlled by using Arduino Leonard programmed with IDE free open source software, that receives the signal code from the car which sends the ID through IR LED or Bluetooth by using a mobile application, decode it. And switch ON the driver that controls the DC motor. This system was designed considering some factors such as low cost and low power requirements, availability of components and low distance so there is no interference. The hardware design and software development are described, and all of the tests indicate that all component goes according to the initial design of this research. 展开更多
关键词 Automatic Auto Opening CAR DOOR identification security
下载PDF
Network Application Identification Based on Communication Characteristics of Application Messages
14
作者 Yuji Waizumi Yuya Tsukabe +2 位作者 Hiroshi Tsunoda Yoshiaki Nemoto Kazuyuki Tanaka 《通讯和计算机(中英文版)》 2011年第2期111-119,共9页
关键词 应用程序 网络应用 消息通信 识别特征 P2P软件 P2P网络 信息共享 网络流量
下载PDF
ITS Telecommunications Solutions Security
15
作者 Tomas Zelinka Miroslav Svitek Zdenek Lokaj Martin Srotyr 《通讯和计算机(中英文版)》 2012年第4期456-465,共10页
关键词 电信服务 安全性能 智能交通系统 无线数据服务 控制局域网 通信解决方案 网络互联 电信运营商
下载PDF
我国重要数据认定制度的探索与完善 被引量:2
16
作者 刘金瑞 《中国应用法学》 2024年第1期189-200,共12页
重要数据认定是国家数据安全监管的基础性制度,明确该制度是维护国家数据安全的必然要求,是落实数据安全保护义务的客观需要,也是促进数据要素价值释放的重要举措。对此,我国相关配套规定和国家标准进行了积极探索,从早期尝试列举重要... 重要数据认定是国家数据安全监管的基础性制度,明确该制度是维护国家数据安全的必然要求,是落实数据安全保护义务的客观需要,也是促进数据要素价值释放的重要举措。对此,我国相关配套规定和国家标准进行了积极探索,从早期尝试列举重要数据具体范围,到目前已转向规定重要数据认定规则,但尚未形成明确统一的规则体系。完善我国重要数据认定制度,要在厘清重要数据概念的基础上,构建基于风险的认定规则体系,主要包括明确重要数据认定的领导体制、细化重要数据认定的条件标准、厘清重要数据认定的疑难界分以及健全重要数据认定的程序机制。 展开更多
关键词 重要数据 认定规则 认定程序 数据安全 国家安全
下载PDF
基于主动探测的Web容器探测识别方法
17
作者 张帆 王振宇 +3 位作者 王红梅 万月亮 宁焕生 李莎 《工程科学学报》 EI CSCD 北大核心 2024年第8期1446-1457,共12页
随着工业互联网的飞速发展,各类Web容器的广泛使用呈现不断增长的趋势,然而,这也使得Web容器资产管理的问题变得更加复杂.随之而来的是诸多网络安全风险和潜在隐患,对于这些挑战,提升网络安全防御水平显得尤为迫切.为了解决这一问题,本... 随着工业互联网的飞速发展,各类Web容器的广泛使用呈现不断增长的趋势,然而,这也使得Web容器资产管理的问题变得更加复杂.随之而来的是诸多网络安全风险和潜在隐患,对于这些挑战,提升网络安全防御水平显得尤为迫切.为了解决这一问题,本文引入了一种新的基于主动探测的Web容器探测识别方法.在探测阶段,采用了一种先进的Web容器探针构建方法,通过此方法构建了Web容器探针.这个探针在识别阶段发挥关键作用,借助一种基于负载内容的Web容器识别方法,通过协议解码技术,实现了对Web容器的高度准确的识别.通过结合这两种先进的识别方法,成功识别了4种不同类型的Web容器,并且提升了精度,能够精确地区分这些Web容器的各个版本,总计实现了10个版本的准确识别.通过这种先进的主动探测方法,企业可以更好地了解和管理其Web容器资产,降低网络安全风险,并确保网络系统的稳定性和安全性. 展开更多
关键词 主动探测 设备识别 Web容器识别 容器探针 安全
下载PDF
气象部门终端入网控制系统的设计与实现
18
作者 钟磊 田征 郭宇清 《计算机技术与发展》 2024年第1期99-105,共7页
气象信息网络的快速发展,促进气象内部网络的设备种类和数量不断增加,对传统的入网管理方式提出新的挑战。现阶段,气象内网办公区网络接入设备数量超过7000台,在网设备的种类和数量难以梳理,违规占用网络资源的现象时有发生。由于接入... 气象信息网络的快速发展,促进气象内部网络的设备种类和数量不断增加,对传统的入网管理方式提出新的挑战。现阶段,气象内网办公区网络接入设备数量超过7000台,在网设备的种类和数量难以梳理,违规占用网络资源的现象时有发生。由于接入设备的合法性难以确定,在违规接入设备后无法第一时间发现和阻断,对业务系统和气象数据安全带来威胁。在网设备可能存在恶意程序运行,接入气象网络后可能对其它设备的安全产生重大影响。传统控制技术需要维护本地的数据信息,存在数据准确性滞后和泄露风险。该文以解决以上问题为出发点,设计和实现适应气象网络需求的无客户端模式终端入网控制系统,通过与统一信任服务系统和终端安全管理系统数据共享,实现身份认证信息的自动更新和维护,同时促进终端安全管理软件在气象园区的广泛应用,及时发现和阻断违规设备的接入,消除潜在的安全隐患。 展开更多
关键词 入网控制 终端安全 统一信任服务 网络安全 身份认证
下载PDF
基于系统论事故分析模型的油气智慧管道系统信息物理风险辨识
19
作者 胡瑾秋 李瑜环 +1 位作者 张来斌 李馨怡 《科学技术与工程》 北大核心 2024年第15期6272-6280,共9页
为了辨识油气智慧管道系统中存在的信息安全风险,通过基于系统论事故分析模型(systems-theoretic accident modeling and process,STAMP)的方法,对油气智慧管道系统的信息物理安全进行全面评估与分析。首先,系统综合分析了油气智慧管道... 为了辨识油气智慧管道系统中存在的信息安全风险,通过基于系统论事故分析模型(systems-theoretic accident modeling and process,STAMP)的方法,对油气智慧管道系统的信息物理安全进行全面评估与分析。首先,系统综合分析了油气智慧管道涉及的设备、设施、工艺、元件,评估其安全性。其次,通过建立STAMP模型,深入分析了各层级、元件之间的反馈信息与控制动作,形成了明确的控制反馈回路,突显了元件之间的关联与控制关系。在此基础上,系统辨识出了潜在的信息风险因素,推导并构建了可能发生的系统失效场景。以天然气输气首站油气智慧管道系统为例,研究验证了基于STAMP模型的可行性和有效性。结果显示,该方法不仅直观地描述了元件之间的关联与控制关系,而且从物理层功能安全的角度全面考虑了信息风险,特别凸显了过程控制系统(process control systems,PCS)及易受攻击的操作员站。与传统方法相比,本研究所提出的方法将信息物理安全风险因素的识别率提升至80%以上,提高了40%以上,有助于避免不必要的安全措施冗余设计,提高了安全风险管控的准确性。 展开更多
关键词 油气智慧管道系统 信息物理安全 智能化风险辨识 STAMP 天然气输气首站
下载PDF
智慧城市建设中的网络信息安全风险识别及其应对策略
20
作者 胡柳 《无线互联科技》 2024年第1期122-124,128,共4页
针对智慧城市发展过程中的网络信息安全风险与挑战,保障智慧城市建设健康持续发展,文章从智慧城市架构体系、网络信息安全风险识别、应对策略3个方面进行阐述。文章根据现有智慧城市建设经验现状,提出了智慧城市架构体系由终端数据采集... 针对智慧城市发展过程中的网络信息安全风险与挑战,保障智慧城市建设健康持续发展,文章从智慧城市架构体系、网络信息安全风险识别、应对策略3个方面进行阐述。文章根据现有智慧城市建设经验现状,提出了智慧城市架构体系由终端数据采集层、网络层、数据层和应用层组成,并对4层结构进行了风险分析;研究了如何识别智慧城市中网络信息安全风险,指出从风险因素、风险来源和风险识别过程和方法3个方面进行描述;从智慧城市规划、管理和应用上,采用技术手段有效降低风险及其带来的损失,以提升智慧城市信息安全保障水平和促进智慧城市建设更加稳健发展。 展开更多
关键词 智慧城市 信息安全 风险识别
下载PDF
上一页 1 2 48 下一页 到第
使用帮助 返回顶部