期刊文献+
共找到2,171篇文章
< 1 2 109 >
每页显示 20 50 100
Security Risk Prevention and Control Deployment for 5G Private Industrial Networks 被引量:1
1
作者 Wenfa Yan Qin Shu Peng Gao 《China Communications》 SCIE CSCD 2021年第9期167-174,共8页
In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application o... In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed. 展开更多
关键词 5G private network network security security risk prevention and control
下载PDF
Event-Triggered Differentially Private Average Consensus for Multi-agent Network 被引量:13
2
作者 Aijuan Wang Xiaofeng Liao Haibo He 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期75-83,共9页
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu... This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis. 展开更多
关键词 Average consensus differentially private event-triggered communication multi-agent network systems (MANSs)
下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
3
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol Security Virtual private network Video Conferencing Voice over Internet Protocol JITTER End to End Delay
下载PDF
Effective and Extensive Virtual Private Network
4
作者 Tarek S. Sobh Yasser Aly 《Journal of Information Security》 2011年第1期39-49,共11页
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh... A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment. 展开更多
关键词 VIRTUAL private network network Security SECURE Data Transmission
下载PDF
Investigation and Analysis on the Status Quo of College Students’Network Entrepreneurship in Private University
5
作者 Shaohong Chen Chao Zhang Lingling Dai 《Journal of Contemporary Educational Research》 2022年第8期81-90,共10页
This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important... This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures. 展开更多
关键词 private university College students network entrepreneurship Suggestions
下载PDF
Aesthetic style transferring method based on deep neural network between Chinese landscape painting and classical private garden's virtual scenario
6
作者 Shuai Hong Jie Shen +4 位作者 Guonian Lü Xiaoyan Liu Yirui Mao Nina Sun Long Tang 《International Journal of Digital Earth》 SCIE EI 2023年第1期1491-1509,共19页
Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.Considering... Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.Considering the aesthetic commonality between traditional Chinese landscape paintings and classical private gardens and referring to image style transfer,here,a deep neural network was proposed to transfer the aesthetic style from landscape paintings to the virtual scenario of classical private gardens.The network consisted of two parts:style prediction and style transfer.The style prediction network was used to obtain style representation from style paintings,and the style transfer network was used to transfer style representation to the content scenario.The pre-trained network was then embedded into the scenario rendering pipeline and combined with the screen post-processing method to realise the stylised expression of the virtual scenario.To verify the feasibility of this methodology,a virtual scenario of the Humble Administrator’s Garden was used as the content scenario andfive garden landscape paintings from different time periods and painting styles were selected for the case study.The results demonstrated that this methodology could effectively achieve the aesthetic style transfer of a virtual scenario. 展开更多
关键词 Chinese classical private garden virtual scenario Chinese traditional landscape painting deep neural network aesthetic style transfer
原文传递
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
7
作者 Hossein Fereidooni Hassan Taheri Mehran Mahramian 《International Journal of Communications, Network and System Sciences》 2012年第4期228-237,共10页
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi... Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats. 展开更多
关键词 Virtual private networks (VPNs) Public KEY Infrastructure Authentication Internet KEY Exchange (IKE) BAN-Logic
下载PDF
STUDY ON NEIGHBORHOOD DISCOVERY PROTOCOL IN COMMUNICATION NETWORKS
8
作者 时成阁 王思兵 +1 位作者 胡家骏 HU Jia-jun 《Journal of Shanghai Jiaotong university(Science)》 EI 2001年第1期52-55,共4页
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed ob... One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object oriented) method for HDOS (Hierarchy Distributed Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements. 展开更多
关键词 OIL algorithm DOO method PNNI routing Hello protocol private ATM network HDOS
下载PDF
STUDY ON NEIGHBORHOOD DISCOVERY PROTOCOL IN COMMUNICATION NETWORKSGRANULAR SLUDGE BY BATCH TESTS
9
作者 SHI Cheng-ge 《Journal of Shanghai Jiaotong university(Science)》 EI 2001年第1期56-61,共6页
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed ob... One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object-oriented) method for HDOS (Hierarchy Distributed-Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements. 展开更多
下载PDF
5G高铁专网覆盖综合解决方案研究和应用 被引量:1
10
作者 李宗恒 邹文杰 +1 位作者 方子贤 何志丰 《电信工程技术与标准化》 2024年第1期87-92,共6页
5G高铁覆盖面临着资源占时短、瞬时容量高、车体损耗大、移动速度快、基站交替快和远近兼顾难等多重挑战。本文针对5G高铁专网的覆盖方案、容量方案、公专网频率协同方案、主设备与天线选型方案、优化创新方案五大关键点开展了对比论证... 5G高铁覆盖面临着资源占时短、瞬时容量高、车体损耗大、移动速度快、基站交替快和远近兼顾难等多重挑战。本文针对5G高铁专网的覆盖方案、容量方案、公专网频率协同方案、主设备与天线选型方案、优化创新方案五大关键点开展了对比论证和深入研究,并应用于某高铁规划建设优化实践中,提升了高铁客户的感知,满足了“5G高铁上车”过渡期的高铁场景5G覆盖需求,为后续高铁覆盖项目的应用推广提供了重要的参考。 展开更多
关键词 无线通信技术 5G网络 5G高铁专网
下载PDF
基于RTD1296的私有存储设备的设计
11
作者 农丽萍 吕嘉嘉 +1 位作者 梁梓辰 黄一平 《现代电子技术》 北大核心 2024年第2期26-30,共5页
为满足私有存储设备传输安全、传输数据高效、节省电能的需求,设计一种以RTD1296为控制核心的千兆私有存储设备。该设备搭载Ubuntu系统和SFTP服务器,确保数据传输安全;采用千兆以太网和千兆无线网卡无缝连接互联网,确保数据高效传输;使... 为满足私有存储设备传输安全、传输数据高效、节省电能的需求,设计一种以RTD1296为控制核心的千兆私有存储设备。该设备搭载Ubuntu系统和SFTP服务器,确保数据传输安全;采用千兆以太网和千兆无线网卡无缝连接互联网,确保数据高效传输;使用ZeroTier异地组网技术实现内网穿透;使用MQTT技术实现设备远程开关机,达到节省电能和保护磁盘数据安全的效果;使用AIRKISS+ESPTOUCH技术实现智能手机配网;具有蓝牙连接一键唤醒设备,提醒用户备份,易用高效。实验结果表明,所设计的私有存储设备能够保证数据传输安全,相比于RTD1195存储设备,该设备的下载速度快3倍,上传速度快7倍,整机节能高达50%,可实现安全、高效、节能、易用的目标。 展开更多
关键词 私有存储设备 RTD1296 Ubuntu系统 SFTP服务器 数据传输 异地组网
下载PDF
中国民营经济高质量发展空间关联网络结构特征及影响因素分析
12
作者 谢金楼 祁泊源 《苏州大学学报(哲学社会科学版)》 北大核心 2024年第1期124-135,共12页
了解民营经济高质量发展的空间关联网络结构状态及其影响因素,对促进民营经济实现高质量发展具有重要作用。以2014年至2021年我国31个省(自治区、直辖市)民营经济的省际面板数据为样本,基于修正后的引力模型测算民营经济高质量发展空间... 了解民营经济高质量发展的空间关联网络结构状态及其影响因素,对促进民营经济实现高质量发展具有重要作用。以2014年至2021年我国31个省(自治区、直辖市)民营经济的省际面板数据为样本,基于修正后的引力模型测算民营经济高质量发展空间关联关系,在此基础上运用社会网络分析法(SNA)和二次指派程序(QAP)探究其空间关联网络结构整体、个体、块模特征及其影响因素。结果表明:我国民营经济高质量发展的空间关联网络结构特征相对稳定,并具有一定等级性;省际民营经济高质量发展的空间关联网络可以分为四个板块;城市距离对民营经济高质量发展的空间关联强度产生显著负向作用,科技投入水平差异、贸易经济水平差异和经济发展水平差异对其产生显著正向影响。研究结果可为推动民营经济高质量发展及引导省际民营经济形成高质量发展的关联网络结构提供参考。 展开更多
关键词 民营经济 高质量发展 网络结构 社会网络分析方法
下载PDF
Chinese Private Direct Investment and Overseas Chinese Network in Africa 被引量:3
13
作者 Hong Song 《China & World Economy》 SCIE 2011年第4期109-126,共18页
Based on extensive interviews in China and in Africa over 2 years, the present paper investigates Chinese private direct investment in Africa. Drawing on the Swedish Uppsala model, we explore two mian issues. First, d... Based on extensive interviews in China and in Africa over 2 years, the present paper investigates Chinese private direct investment in Africa. Drawing on the Swedish Uppsala model, we explore two mian issues. First, do Chinese private enterprises follow the linear mode to invest in Africa? Second, if not, how do they go out and develop their investments, and who helps them overcome the obstacles to investing in Africa? We find that very few Chinese private enterprises follow a linear internationalization process, and most depend on the local overseas Chinese network and other networks to facilitate their entry into the host market. The reason lies in that Chinese private enterprises are still at the early stage of internationalization. Entrepreneurship is one of the most important ownership advantages of Chinese private enterprises investing in Africa. 展开更多
关键词 Chinese private enterprise outward foreign direct investment overseas Chinese business network
原文传递
5G专网部署AI大模型能力的研究
14
作者 聂磊 朱立标 詹晓航 《长江信息通信》 2024年第1期202-205,共4页
为满足行业终端安全接入组织专网的移动性需求,能随时以自然语言交流方式实现行业应用与知识库的人机交互,文章对5G专网和交互式AI模型应用部署进行研究,阐述了在5G专网中部署行业AI大模型能力的解决方案,通过网络切片、安全策略和边缘... 为满足行业终端安全接入组织专网的移动性需求,能随时以自然语言交流方式实现行业应用与知识库的人机交互,文章对5G专网和交互式AI模型应用部署进行研究,阐述了在5G专网中部署行业AI大模型能力的解决方案,通过网络切片、安全策略和边缘云计算的部署方案解决网络安全和信息交互时延等问题,从而拓展5G专网在AI领域的应用场景,保障行业信息和敏感数据,提升工作效率。 展开更多
关键词 5G 5G专网 MEC AI 大语言模型 聊天机器人
下载PDF
Security performance analysis and the parameters simulation of quantum virtual private network based on IPSec protocol 被引量:1
15
作者 Nie Min Tao Jin +2 位作者 Yang Guang Sun Aijing Pei Changxing 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期1-11,共11页
Traditional virtual private networks( VPNs) are conditional security. In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security( IPSec... Traditional virtual private networks( VPNs) are conditional security. In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security( IPSec)protocol is proposed. By using quantum keys for key distribution and entangled particles for identity authentication in the network,a secure quantum VPN is relized. The important parameters affecting the performance of the VPN was analyzed. The quantitative relationship between the security key generation rate,the quantum bit error rate( QBER) and the transmission distance was obtained. The factors that affect the system throughput were also analyzed and simulated. Finally,the influence of the quantum noise channel on the entanglement swapping was analyzed. Theoretical analysis and simulation results show that,under a limited number of decoy states,with the transmission distance increased from 0 to 112. 5 km,the secure key generation rate was reduced from 5. 63 × 10^-3 to 1. 22 × 10^-5. When the number of decoy states is fixed,the QBER increases dramatically with the increase of the transmission distance,and the maximum reaches 0. 393. Analysis shows that various factors in communication have a significant impact on system throughput. The generation rate of the effective entanglement photon pairs have decisive effect on the system throughput. Therefore,in the process of quantum VPN communication,various parameters of the system should be properly adjusted to communicate within a safe transmission distance,which can effectively improve the reliability of the quantum communication system. 展开更多
关键词 virtual private network quantum key identity authentication key generation rate quantum bit error rate THROUGHPUT
原文传递
5G随行专网架构及关键技术研讨
16
作者 王鹏 丁亮亮 《现代传输》 2024年第2期28-32,共5页
5G随行专网是发挥联通5G网络规模优势,强化网络安全接入能力,服务于校园、政务、企业等领域的集约化、定制化产品。其高效的无感分流,替代了传统VPN的接入方式,为个人用户和企业用户提供了高速、低延迟和高可靠性的通信服务。本文将结... 5G随行专网是发挥联通5G网络规模优势,强化网络安全接入能力,服务于校园、政务、企业等领域的集约化、定制化产品。其高效的无感分流,替代了传统VPN的接入方式,为个人用户和企业用户提供了高速、低延迟和高可靠性的通信服务。本文将结合运营商当前随行专网的发展现状,从整体方案切入,对随行专网落地过程中的IP地址冲突问题、二次鉴权问题、静态地址分配问题、单独计费问题及容灾问题进行深入探讨论述,以期为后续随行专网的持续落地提供相应的指导。 展开更多
关键词 随行专网 IP地址冲突 二次鉴权 专网计费 地址分配
下载PDF
基于5G专网的智慧校园建设应用
17
作者 赵恒梅 冷昕 《信息与电脑》 2024年第3期42-46,共5页
通过利用5G高速率、大连接、低时延的三大特点与基于切片技术的5G专网,能有效解决目前智慧校园系统存在的网络建设投资重复、维护难度高、使用效果差、安全性低的问题。文章首先分析5G网络的特点和智慧校园目前存在的问题,其次围绕问题... 通过利用5G高速率、大连接、低时延的三大特点与基于切片技术的5G专网,能有效解决目前智慧校园系统存在的网络建设投资重复、维护难度高、使用效果差、安全性低的问题。文章首先分析5G网络的特点和智慧校园目前存在的问题,其次围绕问题提出智慧校园的架构设计与5G专网网络在设计中的优势,最后面向商用提出多种可部署的架构,分析每种架构的优缺点。 展开更多
关键词 5G专网 智慧校园 切片 ULCL
下载PDF
宽带多媒体数字集群轨道专网通信方法研究
18
作者 刘玉江 《通信电源技术》 2024年第11期176-178,共3页
宽带多媒体数字集群方法能够接收更多的数据量,是满足现代轨道交通通信需求的关键方法之一,为此文章提出宽带多媒体数字集群轨道专网通信方法研究。通过精确分配传输路径上的数据量,优化通信效率。为确保轨道专网通信数据的安全性,采用... 宽带多媒体数字集群方法能够接收更多的数据量,是满足现代轨道交通通信需求的关键方法之一,为此文章提出宽带多媒体数字集群轨道专网通信方法研究。通过精确分配传输路径上的数据量,优化通信效率。为确保轨道专网通信数据的安全性,采用先进的加密技术,构建数据安全同态加密协议,成功得到轨道专网通信数据加密结果。设计轨道专网低时延通信流程,实现轨道专网低时延通信。实验结果表明,该方法在通信过程中接收数据量较多,通信效果较好,更适合实际应用。 展开更多
关键词 宽带多媒体 数字集群 轨道专网 安全与隐私保护
下载PDF
Setting-up and preliminary performance of the interactive teleradiolog ical conference system based on virtual private network
19
作者 王学建 胡建 +3 位作者 王康 余晖 罗敏 雷文勇 《Chinese Medical Journal》 SCIE CAS CSCD 2004年第11期1735-1738,共4页
关键词 TELEMEDICINE computer communication networks virtual private network diagnositic imaging
原文传递
5G CPE作为下沉UPF备份链路的解决方案
20
作者 张红军 刘华东 +2 位作者 吴兵 李生祯 戈玲 《电信工程技术与标准化》 2024年第8期67-73,共7页
5G专网的下沉UPF在发生业务中断故障时,根据不同的保障级别,业务故障处理时限为2~6小时。由传输引起的业务中断处理时间比较长,容易引起客户投诉。现有方案一般采用传输双路由的方式,即在UPF至SPN间建立双光缆路由,投资较大。本文以5G ... 5G专网的下沉UPF在发生业务中断故障时,根据不同的保障级别,业务故障处理时限为2~6小时。由传输引起的业务中断处理时间比较长,容易引起客户投诉。现有方案一般采用传输双路由的方式,即在UPF至SPN间建立双光缆路由,投资较大。本文以5G CPE作为接入点,通过共享UPF进行路由转发,利用CPE至共享UPF的连接搭建临时的路由,疏导下沉UPF的N3、N4、N9口等流量,提升客户满意度。 展开更多
关键词 5G专网 下沉UPF 帧路由
下载PDF
上一页 1 2 109 下一页 到第
使用帮助 返回顶部