Taking the cooperation between China and Pakistan as an example,this paper expounds on the current situation,governance concept,obstacles to cooperation,and differentiated policies of Western countries in the areas of...Taking the cooperation between China and Pakistan as an example,this paper expounds on the current situation,governance concept,obstacles to cooperation,and differentiated policies of Western countries in the areas of cybersecurity,the role of new e-commerce platforms,and digital sovereignty of BRICS countries.It aims to promote inter-governmental cooperation through civil dialogue and lead information technology cooperation among developing countries through the BRICS mechanism,as well as to collaborate to establish guidelines for global cybersecurity,new e-commerce platforms,and digital sovereignty.展开更多
Accurate purchase prediction in e-commerce critically depends on the quality of behavioral features.This paper proposes a layered and interpretable feature engineering framework that organizes user signals into three ...Accurate purchase prediction in e-commerce critically depends on the quality of behavioral features.This paper proposes a layered and interpretable feature engineering framework that organizes user signals into three layers:Basic,Conversion&Stability(efficiency and volatility across actions),and Advanced Interactions&Activity(crossbehavior synergies and intensity).Using real Taobao(Alibaba’s primary e-commerce platform)logs(57,976 records for 10,203 users;25 November–03 December 2017),we conducted a hierarchical,layer-wise evaluation that holds data splits and hyperparameters fixed while varying only the feature set to quantify each layer’s marginal contribution.Across logistic regression(LR),decision tree,random forest,XGBoost,and CatBoost models with stratified 5-fold cross-validation,the performance improvedmonotonically fromBasic to Conversion&Stability to Advanced features.With LR,F1 increased from 0.613(Basic)to 0.962(Advanced);boosted models achieved high discrimination(0.995 AUC Score)and an F1 score up to 0.983.Calibration and precision–recall analyses indicated strong ranking quality and acknowledged potential dataset and period biases given the short(9-day)window.By making feature contributions measurable and reproducible,the framework complements model-centric advances and offers a transparent blueprint for production-grade behavioralmodeling.The code and processed artifacts are publicly available,and future work will extend the validation to longer,seasonal datasets and hybrid approaches that combine automated feature learning with domain-driven design.展开更多
The purpose of this study is to analyze factors affecting the purchasing behavior of low-income Vietnamese on e-commerce platforms.700 questionnaires were dispersed among universities,coffee shops,and Facebook communi...The purpose of this study is to analyze factors affecting the purchasing behavior of low-income Vietnamese on e-commerce platforms.700 questionnaires were dispersed among universities,coffee shops,and Facebook community groups in Vietnam.Respondents to the questionnaires were consumers of those places in Vietnam,which were randomly selected.Finally,SEM analysis was used on the data to test the hypotheses of the study.The study identified that“Subjective norms”and“Consumer attitudes”have no effect on shopping behavior on e-commerce platforms,while“Perceived behavioral control”is most affected and“Perceived risks”are least affected on shopping behavior.展开更多
With the rapid development of the Internet and e-commerce,e-commerce platforms have accumulated huge amounts of user behavior data.The emergence of big data technology provides a powerful means for in-depth analysis o...With the rapid development of the Internet and e-commerce,e-commerce platforms have accumulated huge amounts of user behavior data.The emergence of big data technology provides a powerful means for in-depth analysis of these data and insight into user behavior patterns and preferences.This paper elaborates on the application of big data technology in the analysis of user behavior on e-commerce platforms,including the technical methods of data collection,storage,processing and analysis,as well as the specific applications in the construction of user profiles,precision marketing,personalized recommendation,user retention and churn analysis,etc.,and discusses the challenges and countermeasures faced in the application.Through the study of actual cases,it demonstrates the remarkable effectiveness of big data technology in enhancing the competitiveness of e-commerce platforms and user experience.展开更多
Information and communication technologies are spreading rapidly due to their fast proliferation in many fields.The number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as...Information and communication technologies are spreading rapidly due to their fast proliferation in many fields.The number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as online banking,marketing,trading,and other online businesses,play an integral role in our lives.Network Intrusion Detection System(NIDS)is essential to protect the network from unauthorized access and against other cyber-attacks.The existing NIDS systems are based on the Backward Oracle Matching(BOM)algorithm,which minimizes the false alarm rate and causes of high packet drop ratio.This paper discussed the existing NIDS systems and different used pattern-matching techniques regarding their weaknesses and limitations.To address the existing system issues,this paper proposes an enhanced version of the BOM algorithm by using multiple pattern-matching methods for the NIDS system to improve the network performance.The proposed solution is tested in simulation with existing solutions using the Snort and NSL-KDD datasets.The experimental results indicated that the proposed solution performed better than the existing solutions and achieved a 5.17%detection rate and a 0.22%lower false alarm rate than the existing solution.展开更多
In the era of big data,E-commerce plays an increasingly important role,and steel E-commerce certainly occupies a positive position.However,it is very difficult to choose satisfactory steel raw materials from diverse s...In the era of big data,E-commerce plays an increasingly important role,and steel E-commerce certainly occupies a positive position.However,it is very difficult to choose satisfactory steel raw materials from diverse steel commodities online on steel E-commerce platforms in the purchase of staffs.In order to improve the efficiency of purchasers searching for commodities on the steel E-commerce platforms,we propose a novel deep learning-based loss function for named entity recognition(NER).Considering the impacts of small sample and imbalanced data,in our NER scheme,the focal loss,the label smoothing,and the cross entropy are incorporated into a lite bidirectional encoder representations from transformers(BERT)model to avoid the over-fitting.Moreover,through the analysis of different classic annotation techniques used to tag data,an ideal one is chosen for the training model in our proposed scheme.Experiments are conducted on Chinese steel E-commerce datasets.The experimental results show that the training time of a lite BERT(ALBERT)-based method is much shorter than that of BERT-based models,while achieving the similar computational performance in terms of metrics precision,recall,and F1 with BERT-based models.Meanwhile,our proposed approach performs much better than that of combining Word2Vec,bidirectional long short-term memory(Bi-LSTM),and conditional random field(CRF)models,in consideration of training time and F1.展开更多
With the continuous development of artificial intelligence technology,its application field has gradually expanded.To further apply the deep reinforcement learning technology to the field of dynamic pricing,we build a...With the continuous development of artificial intelligence technology,its application field has gradually expanded.To further apply the deep reinforcement learning technology to the field of dynamic pricing,we build an intelligent dynamic pricing system,introduce the reinforcement learning technology related to dynamic pricing,and introduce existing research on the number of suppliers(single supplier and multiple suppliers),environmental models,and selection algorithms.A two-period dynamic pricing game model is designed to assess the optimal pricing strategy for e-commerce platforms under two market conditions and two consumer participation conditions.The first step is to analyze the pricing strategies of e-commerce platforms in mature markets,analyze the optimal pricing and profits of various enterprises under different strategy combinations,compare different market equilibriums and solve the Nash equilibrium.Then,assuming that all consumers are naive in the market,the pricing strategy of the duopoly e-commerce platform in emerging markets is analyzed.By comparing and analyzing the optimal pricing and total profit of each enterprise under different strategy combinations,the subgame refined Nash equilibrium is solved.Finally,assuming that the market includes all experienced consumers,the pricing strategy of the duopoly e-commerce platform in emerging markets is analyzed.展开更多
With deepening digital technology applications in international trade, e-commerce platforms have become a major avenue for firm export. Based on a multicountry, multi-product heterogeneous firms trade theory model, th...With deepening digital technology applications in international trade, e-commerce platforms have become a major avenue for firm export. Based on a multicountry, multi-product heterogeneous firms trade theory model, this paper investigates the firm export effects of e-commerce platforms, and empirically tests the inferences from the model using data from Alibaba China Station, China industrial enterprises data, and China customs data from 2000 to 2009. Our estimation result shows that overall, e-commerce platforms significantly increase firm export probability and volume;e-commerce platforms enable firms to export products of different types to more countries by reducing the cost of information and export markets threshold while raising trade efficiency. Further analysis of enterprise heterogeneity reveals that SMEs, firms in China's eastern region, and general exporters benefit more from e-commerce platforms than other types of firms do.展开更多
E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are in...E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are involved in the deployment of the security. The related standards and protocols of e-commerce are studied in this paper. The general model of e-commerce security is set forth. In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secure electronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented.展开更多
Industrial intelligence and secure interconnection serve as the foundational platform and critical information infrastructure for new industrialization,carrying significant strategic importance.They not only function ...Industrial intelligence and secure interconnection serve as the foundational platform and critical information infrastructure for new industrialization,carrying significant strategic importance.They not only function as the core engine driving the transformation and upgrading of the manufacturing sector and ensuring stable socioeconomic operation but are also vital to enhancing national technological competitiveness and safeguarding industrial security.展开更多
The Optical Transport Network(OTN)is a protocol for sending network messaging over optical fiber networks.Intelligent optical networks provide an ideal solution for high-bandwidth services.Currently,data encryption sc...The Optical Transport Network(OTN)is a protocol for sending network messaging over optical fiber networks.Intelligent optical networks provide an ideal solution for high-bandwidth services.Currently,data encryption schemes for OTN typically rely on mathematical problems such as elliptic curve cryptography or discrete logarithms,which are vulnerable to attacks by quantum computers.This paper investigates a quantum-secure OTN Framework that integrates Quantum Key Distribution(QKD)and Post-Quantum Cryptography(PQC)technologies,enabling OTN leased lines to resist quantum attacks.This framework can provide users with highly secure quantum-encrypted OTN leased lines services.展开更多
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanis...The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribu...In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.展开更多
E-commerce is a new consumption mode, which develops rapidly and is welcomed by consumers. It also plays an important role in promoting the international trade. Through this analysis, we can understand that the influe...E-commerce is a new consumption mode, which develops rapidly and is welcomed by consumers. It also plays an important role in promoting the international trade. Through this analysis, we can understand that the influence of the e-commerce on the international market has both positive and negative aspects. We need to be aware of our shortcomings, understand the gap between them and the developed countries, and formulate the relevant policies. Let China's e-commerce continue to improve and innovate in the international trade, and find a suitable strategy for its own development. Relevant Chinese departments should actively and effectively participate in the construction of e-commerce. On the one hand, they can stabilize the status of e-commerce in the international trade, and on the other hand, they can expand the consumer groups and make the electronic goods better.展开更多
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis...The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.展开更多
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed...In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology.展开更多
This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the...This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the logistic regression algorithm. In addition, it analyzed user data obtained from an e-commerce platform. The original data were preprocessed, and a consumer purchase prediction model was developed for the e-commerce platform using the logistic regression method. The comparison study used the classic random forest approach, further enhanced by including the K-fold cross-validation method. Evaluation of the accuracy of the model’s classification was conducted using performance indicators that included the accuracy rate, the precision rate, the recall rate, and the F1 score. A visual examination determined the significance of the findings. The findings suggest that employing the logistic regression algorithm to forecast customer purchase behaviors on e-commerce platforms can improve the efficacy of the approach and yield more accurate predictions. This study serves as a valuable resource for improving the precision of forecasting customers’ purchase behaviors on e-commerce platforms. It has significant practical implications for optimizing the operational efficiency of e-commerce platforms.展开更多
This paper proposes the assumption of E-commerce platform of the agricultural products based on the F2C2B mode. The whole e-commerce model is guided by the idea of the supply chain management from the perspective of t...This paper proposes the assumption of E-commerce platform of the agricultural products based on the F2C2B mode. The whole e-commerce model is guided by the idea of the supply chain management from the perspective of the modern system, and the e-commerce integration model from customer to supplier is implemented, and the whole is optimized. E-commerce to cloud computing as the basic environment, the construction of public cloud services and private cloud resources, based on public cloud to the SaaS way to provide services to customers, focus on business search and business collaboration, make full use of the lnternet, modern communications technology to provide the real- service. The development of agricultural economy, no longer depends only on the number of some traditional agricultural resources, but also depends on the modern technology, information access and use. Through the development of basic network technology, by virtue of some modern electronic information technology and some other means that can improve the intelligence of agricultural use of the information resources, the proposed model provides the new methodology of the solution.展开更多
文摘Taking the cooperation between China and Pakistan as an example,this paper expounds on the current situation,governance concept,obstacles to cooperation,and differentiated policies of Western countries in the areas of cybersecurity,the role of new e-commerce platforms,and digital sovereignty of BRICS countries.It aims to promote inter-governmental cooperation through civil dialogue and lead information technology cooperation among developing countries through the BRICS mechanism,as well as to collaborate to establish guidelines for global cybersecurity,new e-commerce platforms,and digital sovereignty.
基金supported by the research fund of Hanyang University(HY-202500000001616).
文摘Accurate purchase prediction in e-commerce critically depends on the quality of behavioral features.This paper proposes a layered and interpretable feature engineering framework that organizes user signals into three layers:Basic,Conversion&Stability(efficiency and volatility across actions),and Advanced Interactions&Activity(crossbehavior synergies and intensity).Using real Taobao(Alibaba’s primary e-commerce platform)logs(57,976 records for 10,203 users;25 November–03 December 2017),we conducted a hierarchical,layer-wise evaluation that holds data splits and hyperparameters fixed while varying only the feature set to quantify each layer’s marginal contribution.Across logistic regression(LR),decision tree,random forest,XGBoost,and CatBoost models with stratified 5-fold cross-validation,the performance improvedmonotonically fromBasic to Conversion&Stability to Advanced features.With LR,F1 increased from 0.613(Basic)to 0.962(Advanced);boosted models achieved high discrimination(0.995 AUC Score)and an F1 score up to 0.983.Calibration and precision–recall analyses indicated strong ranking quality and acknowledged potential dataset and period biases given the short(9-day)window.By making feature contributions measurable and reproducible,the framework complements model-centric advances and offers a transparent blueprint for production-grade behavioralmodeling.The code and processed artifacts are publicly available,and future work will extend the validation to longer,seasonal datasets and hybrid approaches that combine automated feature learning with domain-driven design.
文摘The purpose of this study is to analyze factors affecting the purchasing behavior of low-income Vietnamese on e-commerce platforms.700 questionnaires were dispersed among universities,coffee shops,and Facebook community groups in Vietnam.Respondents to the questionnaires were consumers of those places in Vietnam,which were randomly selected.Finally,SEM analysis was used on the data to test the hypotheses of the study.The study identified that“Subjective norms”and“Consumer attitudes”have no effect on shopping behavior on e-commerce platforms,while“Perceived behavioral control”is most affected and“Perceived risks”are least affected on shopping behavior.
文摘With the rapid development of the Internet and e-commerce,e-commerce platforms have accumulated huge amounts of user behavior data.The emergence of big data technology provides a powerful means for in-depth analysis of these data and insight into user behavior patterns and preferences.This paper elaborates on the application of big data technology in the analysis of user behavior on e-commerce platforms,including the technical methods of data collection,storage,processing and analysis,as well as the specific applications in the construction of user profiles,precision marketing,personalized recommendation,user retention and churn analysis,etc.,and discusses the challenges and countermeasures faced in the application.Through the study of actual cases,it demonstrates the remarkable effectiveness of big data technology in enhancing the competitiveness of e-commerce platforms and user experience.
文摘Information and communication technologies are spreading rapidly due to their fast proliferation in many fields.The number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as online banking,marketing,trading,and other online businesses,play an integral role in our lives.Network Intrusion Detection System(NIDS)is essential to protect the network from unauthorized access and against other cyber-attacks.The existing NIDS systems are based on the Backward Oracle Matching(BOM)algorithm,which minimizes the false alarm rate and causes of high packet drop ratio.This paper discussed the existing NIDS systems and different used pattern-matching techniques regarding their weaknesses and limitations.To address the existing system issues,this paper proposes an enhanced version of the BOM algorithm by using multiple pattern-matching methods for the NIDS system to improve the network performance.The proposed solution is tested in simulation with existing solutions using the Snort and NSL-KDD datasets.The experimental results indicated that the proposed solution performed better than the existing solutions and achieved a 5.17%detection rate and a 0.22%lower false alarm rate than the existing solution.
基金This work was supported in part by the National Natural Science Foundation of China under Grants U1836106 and 81961138010in part by the Beijing Natural Science Foundation under Grants M21032 and 19L2029+2 种基金in part by the Beijing Intelligent Logistics System Collaborative Innovation Center under Grant BILSCIC-2019KF-08in part by the Scientific and Technological Innovation Foundation of Shunde Graduate School,USTB,under Grants BK20BF010 and BK19BF006in part by the Fundamental Research Funds for the University of Science and Technology Beijing under Grant FRF-BD-19-012A.
文摘In the era of big data,E-commerce plays an increasingly important role,and steel E-commerce certainly occupies a positive position.However,it is very difficult to choose satisfactory steel raw materials from diverse steel commodities online on steel E-commerce platforms in the purchase of staffs.In order to improve the efficiency of purchasers searching for commodities on the steel E-commerce platforms,we propose a novel deep learning-based loss function for named entity recognition(NER).Considering the impacts of small sample and imbalanced data,in our NER scheme,the focal loss,the label smoothing,and the cross entropy are incorporated into a lite bidirectional encoder representations from transformers(BERT)model to avoid the over-fitting.Moreover,through the analysis of different classic annotation techniques used to tag data,an ideal one is chosen for the training model in our proposed scheme.Experiments are conducted on Chinese steel E-commerce datasets.The experimental results show that the training time of a lite BERT(ALBERT)-based method is much shorter than that of BERT-based models,while achieving the similar computational performance in terms of metrics precision,recall,and F1 with BERT-based models.Meanwhile,our proposed approach performs much better than that of combining Word2Vec,bidirectional long short-term memory(Bi-LSTM),and conditional random field(CRF)models,in consideration of training time and F1.
基金His work is supported by Scientific research planning project of Jilin Provincial Department of education in 2020:Analysis of the impact of industrial upgrading on employment of college students in Jilin Province(No.JJKH20200505JY).
文摘With the continuous development of artificial intelligence technology,its application field has gradually expanded.To further apply the deep reinforcement learning technology to the field of dynamic pricing,we build an intelligent dynamic pricing system,introduce the reinforcement learning technology related to dynamic pricing,and introduce existing research on the number of suppliers(single supplier and multiple suppliers),environmental models,and selection algorithms.A two-period dynamic pricing game model is designed to assess the optimal pricing strategy for e-commerce platforms under two market conditions and two consumer participation conditions.The first step is to analyze the pricing strategies of e-commerce platforms in mature markets,analyze the optimal pricing and profits of various enterprises under different strategy combinations,compare different market equilibriums and solve the Nash equilibrium.Then,assuming that all consumers are naive in the market,the pricing strategy of the duopoly e-commerce platform in emerging markets is analyzed.By comparing and analyzing the optimal pricing and total profit of each enterprise under different strategy combinations,the subgame refined Nash equilibrium is solved.Finally,assuming that the market includes all experienced consumers,the pricing strategy of the duopoly e-commerce platform in emerging markets is analyzed.
文摘With deepening digital technology applications in international trade, e-commerce platforms have become a major avenue for firm export. Based on a multicountry, multi-product heterogeneous firms trade theory model, this paper investigates the firm export effects of e-commerce platforms, and empirically tests the inferences from the model using data from Alibaba China Station, China industrial enterprises data, and China customs data from 2000 to 2009. Our estimation result shows that overall, e-commerce platforms significantly increase firm export probability and volume;e-commerce platforms enable firms to export products of different types to more countries by reducing the cost of information and export markets threshold while raising trade efficiency. Further analysis of enterprise heterogeneity reveals that SMEs, firms in China's eastern region, and general exporters benefit more from e-commerce platforms than other types of firms do.
文摘E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are involved in the deployment of the security. The related standards and protocols of e-commerce are studied in this paper. The general model of e-commerce security is set forth. In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secure electronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented.
文摘Industrial intelligence and secure interconnection serve as the foundational platform and critical information infrastructure for new industrialization,carrying significant strategic importance.They not only function as the core engine driving the transformation and upgrading of the manufacturing sector and ensuring stable socioeconomic operation but are also vital to enhancing national technological competitiveness and safeguarding industrial security.
基金National Development and Reform Commission(NDRC)New-Generation Information Infrastructure Construction Project:National Wide-Area Quantum Secure Communication Backbone Network Construction Project(0747-2260SCCSHV90(001))。
文摘The Optical Transport Network(OTN)is a protocol for sending network messaging over optical fiber networks.Intelligent optical networks provide an ideal solution for high-bandwidth services.Currently,data encryption schemes for OTN typically rely on mathematical problems such as elliptic curve cryptography or discrete logarithms,which are vulnerable to attacks by quantum computers.This paper investigates a quantum-secure OTN Framework that integrates Quantum Key Distribution(QKD)and Post-Quantum Cryptography(PQC)technologies,enabling OTN leased lines to resist quantum attacks.This framework can provide users with highly secure quantum-encrypted OTN leased lines services.
基金Supported by the National Natural Science Foun-dation of China (50077007) the Youth Teacher Foundation ofNorth China Electric Power University (20051101)
文摘The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
文摘In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.
文摘E-commerce is a new consumption mode, which develops rapidly and is welcomed by consumers. It also plays an important role in promoting the international trade. Through this analysis, we can understand that the influence of the e-commerce on the international market has both positive and negative aspects. We need to be aware of our shortcomings, understand the gap between them and the developed countries, and formulate the relevant policies. Let China's e-commerce continue to improve and innovate in the international trade, and find a suitable strategy for its own development. Relevant Chinese departments should actively and effectively participate in the construction of e-commerce. On the one hand, they can stabilize the status of e-commerce in the international trade, and on the other hand, they can expand the consumer groups and make the electronic goods better.
文摘The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.
文摘In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology.
文摘This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the logistic regression algorithm. In addition, it analyzed user data obtained from an e-commerce platform. The original data were preprocessed, and a consumer purchase prediction model was developed for the e-commerce platform using the logistic regression method. The comparison study used the classic random forest approach, further enhanced by including the K-fold cross-validation method. Evaluation of the accuracy of the model’s classification was conducted using performance indicators that included the accuracy rate, the precision rate, the recall rate, and the F1 score. A visual examination determined the significance of the findings. The findings suggest that employing the logistic regression algorithm to forecast customer purchase behaviors on e-commerce platforms can improve the efficacy of the approach and yield more accurate predictions. This study serves as a valuable resource for improving the precision of forecasting customers’ purchase behaviors on e-commerce platforms. It has significant practical implications for optimizing the operational efficiency of e-commerce platforms.
文摘This paper proposes the assumption of E-commerce platform of the agricultural products based on the F2C2B mode. The whole e-commerce model is guided by the idea of the supply chain management from the perspective of the modern system, and the e-commerce integration model from customer to supplier is implemented, and the whole is optimized. E-commerce to cloud computing as the basic environment, the construction of public cloud services and private cloud resources, based on public cloud to the SaaS way to provide services to customers, focus on business search and business collaboration, make full use of the lnternet, modern communications technology to provide the real- service. The development of agricultural economy, no longer depends only on the number of some traditional agricultural resources, but also depends on the modern technology, information access and use. Through the development of basic network technology, by virtue of some modern electronic information technology and some other means that can improve the intelligence of agricultural use of the information resources, the proposed model provides the new methodology of the solution.