期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
1
作者 Jinxin Zuo yueming lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
在线阅读 下载PDF
An Alternative-Service Recommending Algorithm Based on Semantic Similarity 被引量:2
2
作者 Kun Guo Yonghua Li yueming lu 《China Communications》 SCIE CSCD 2017年第8期124-136,共13页
With the development of the Internet of Things(Io T), people's lives have become increasingly convenient. It is desirable for smart home(SH) systems to integrate and leverage the enormous information available fro... With the development of the Internet of Things(Io T), people's lives have become increasingly convenient. It is desirable for smart home(SH) systems to integrate and leverage the enormous information available from IoT. Information can be analyzed to learn user intentions and automatically provide the appropriate services. However, existing service recommendation models typically do not consider the services that are unavailable in a user's living environment. In order to address this problem, we propose a series of semantic models for SH devices. These semantic models can be used to infer user intentions. Based on the models, we proposed a service recommendation probability model and an alternative-service recommending algorithm. The algorithm is devoted to providing appropriate alternative services when the desired service is unavailable. The algorithm has been implemented and achieves accuracy higher than traditional Hidden Markov Model(HMM). The maximum accuracy achieved is 68.3%. 展开更多
关键词 activity recognition semantic model service recommendation unavailable service
在线阅读 下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
3
作者 Jinxin Zuo yueming lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 Complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
在线阅读 下载PDF
Game-theoretic private blockchain design in edge computing networks
4
作者 Daoqi Han Yang Liu +1 位作者 Fangwei Zhang yueming lu 《Digital Communications and Networks》 CSCD 2024年第6期1622-1634,共13页
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the partic... Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the participants are self-interested and lack feedback of complete information.Traditional blockchains have similar faults,such as trustlessness,single-factor consensus,and heavily distributed ledger,preventing them from adapting to the heterogeneous and resource-constrained Internet of Things.In this paper,we develop the game-theoretic design of a two-sided rating with complete information feedback to stimulate collaborations for private blockchain.The design consists of an evolution strategy of the decision-making network and a computing power network for continuously verifiable proofs.We formulate the optimum rating and resource scheduling problems as two-stage iterative games between participants and leaders.We theoretically prove that the Stackelberg equilibrium exists and the group evolution is stable.Then,we propose a multi-stage evolution consensus with feedback on a block-accounting workload for metadata survival.To continuously validate a block,the metadata of the optimum rating,privacy,and proofs are extracted to store on a lightweight blockchain.Moreover,to increase resource utilization,surplus computing power is scheduled flexibly to enhance security by degrees.Finally,the evaluation results show the validity and efficiency of our model,thereby solving the collaboration dilemma in the private blockchain. 展开更多
关键词 ECOSYSTEM Edge computing Feedback Stackelberg game Private blockchain Scalable computing power
在线阅读 下载PDF
Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillator 被引量:1
5
作者 DENGKE QI XIANGYU WANG +4 位作者 ZHENGHUA LI JIAYU MA ZIYANG CHEN yueming lu SONG YU 《Photonics Research》 SCIE EI CAS CSCD 2024年第6期1262-1273,共12页
Quantum networks provide opportunities and challenges across a range of intellectual and technical frontiers,including quantum computation,communication,and others.Unlike traditional communication networks,quantum net... Quantum networks provide opportunities and challenges across a range of intellectual and technical frontiers,including quantum computation,communication,and others.Unlike traditional communication networks,quantum networks utilize quantum bits rather than classical bits to store and transmit information.Quantum key distribution(QKD)relying on the principles of quantum mechanics is a key component in quantum networks and enables two parties to produce a shared random secret key,thereby ensuring the security of data transmission.In this work,we propose a cost-effective quantum downstream access network structure in which each user can get their corresponding key information through terminal distribution.Based on this structure,we demonstrate the first four-end-users quantum downstream access network in continuous variable QKD with a local local oscillator.In contrast to point-to-point continuous variable QKD,the network architecture reevaluates the security of each user and accounts for it accordingly,and each user has a lower tolerance for excess noise as the overall network expands with more users.Hence,the feasibility of the experiment is based on the analysis of the theoretical model,noise analysis,and multiple techniques such as the particle filter and adaptive equalization algorithm used to suppress excess noise.The results show that each user can get a low level of excess noise and can achieve secret key rates of 546 kbps,535 kbps,522.5 kbps,and 512.5 kbps under a transmission distance of 10 km,respectively,with the finite-size block of 1×10~8.This not only verifies the good performance but also provides the foundation for the future multi-user quantum downstream access networks. 展开更多
关键词 QUANTUM OSCILLATOR LOCAL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部