With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas...With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.展开更多
The effects of yttrium and artificial aging on AA2024 alloy were investigated.The developed samples were further subjected to artificial aging at 190℃for 1-10 h with an interval of 1 h.The metallurgical characterizat...The effects of yttrium and artificial aging on AA2024 alloy were investigated.The developed samples were further subjected to artificial aging at 190℃for 1-10 h with an interval of 1 h.The metallurgical characterization was done by scanning electron microscope and X-ray diffraction.The mechanical characterization like hardness and tensile strength of the samples was done using computerized Vickers hardness testing machine and universal testing machine.The microstructures revealed that addition of yttrium refined theα(Al)matrix and led to the formation of Al-Cu-Y intermetallic in the shape of Chinese script which strengthened the samples.Compared to the base metal,samples with yttrium addition showed better mechanical properties.The sample reinforced with 0.3 wt.%yttrium showed the highest mechanical properties with the hardness of 66 HV,UTS of 223 MPa,YS of 180 MPa,and elongation of 20.9%.The artificially aged samples showed that the peak hardening of all the samples took place within 5 h of aging at 190℃with Al2 Cu precipitation.Aging changed the intermetallic from Chinese script to the fibrous form.The optimum amount of yttrium addition to AA2024 was found to be 0.3 wt.%.展开更多
A general methodology for developing intelligent CAE systems is presented, which is based on a so-called Model Based Reasoning Approach (MBRA) in knowledge engineering. Generic features of CAE systems are described, a...A general methodology for developing intelligent CAE systems is presented, which is based on a so-called Model Based Reasoning Approach (MBRA) in knowledge engineering. Generic features of CAE systems are described, and a generic model for the architecture of CAE systems with these generic features is then presented. A model-based reasoning approach is modified for implementing the generic model. A case for developing a computer system for the mechanism design based on a specific finite element theory is used to explain the methodology.展开更多
The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. But the nodes in the paths may be possibly attacked by the adversarial uncertainty. Aiming at this ...The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. But the nodes in the paths may be possibly attacked by the adversarial uncertainty. Aiming at this problem in MPLS Network, in this paper, we propose a novel mechanism in MPLS network under adversar-ial uncertainty, making use of the theory of artificial intelligence, at first, we find the initialized label switching paths (LSPs) using the A* arithmetic, and secondly, during the process of data transmission, we switch the transmission path duly by taking advantage of the non-monotone reasoning mechanism. Com-pared to the traditional route mechanism, the experimental results show that it improves the security if data transmission remarkably under our novel mechanism in MPLS network.展开更多
基金Our work is supported by the National Key R&D Program of China(2021YFB2012400).
文摘With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.
文摘The effects of yttrium and artificial aging on AA2024 alloy were investigated.The developed samples were further subjected to artificial aging at 190℃for 1-10 h with an interval of 1 h.The metallurgical characterization was done by scanning electron microscope and X-ray diffraction.The mechanical characterization like hardness and tensile strength of the samples was done using computerized Vickers hardness testing machine and universal testing machine.The microstructures revealed that addition of yttrium refined theα(Al)matrix and led to the formation of Al-Cu-Y intermetallic in the shape of Chinese script which strengthened the samples.Compared to the base metal,samples with yttrium addition showed better mechanical properties.The sample reinforced with 0.3 wt.%yttrium showed the highest mechanical properties with the hardness of 66 HV,UTS of 223 MPa,YS of 180 MPa,and elongation of 20.9%.The artificially aged samples showed that the peak hardening of all the samples took place within 5 h of aging at 190℃with Al2 Cu precipitation.Aging changed the intermetallic from Chinese script to the fibrous form.The optimum amount of yttrium addition to AA2024 was found to be 0.3 wt.%.
文摘A general methodology for developing intelligent CAE systems is presented, which is based on a so-called Model Based Reasoning Approach (MBRA) in knowledge engineering. Generic features of CAE systems are described, and a generic model for the architecture of CAE systems with these generic features is then presented. A model-based reasoning approach is modified for implementing the generic model. A case for developing a computer system for the mechanism design based on a specific finite element theory is used to explain the methodology.
文摘The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. But the nodes in the paths may be possibly attacked by the adversarial uncertainty. Aiming at this problem in MPLS Network, in this paper, we propose a novel mechanism in MPLS network under adversar-ial uncertainty, making use of the theory of artificial intelligence, at first, we find the initialized label switching paths (LSPs) using the A* arithmetic, and secondly, during the process of data transmission, we switch the transmission path duly by taking advantage of the non-monotone reasoning mechanism. Com-pared to the traditional route mechanism, the experimental results show that it improves the security if data transmission remarkably under our novel mechanism in MPLS network.
基金Acknowledgements: This work is supported by the National Nature Science Foundation of China (No. 90104029) and Specialized Research Fund for the Doctoral Program of Higher Education (No. 20050487046).