期刊文献+
共找到473,468篇文章
< 1 2 250 >
每页显示 20 50 100
Ecological security evaluation and early warning of ski tourism destinations
1
作者 TANG Chengcai HAN Ying JIANG Ling 《Journal of Geographical Sciences》 2025年第9期1953-1978,共26页
To address the contradiction between the rapid development of ski tourism and effective protection of the ecological environment,this study constructed the DPSIR-EES(Drive-Pressures-State-Impact-Response-Environment-E... To address the contradiction between the rapid development of ski tourism and effective protection of the ecological environment,this study constructed the DPSIR-EES(Drive-Pressures-State-Impact-Response-Environment-Economy-Society)model and Ski Tourism Destination Ecological Security System(STDESS)framework system.They form an integrated methodology system based on the“entropy weighting-hierarchical analysis-gray correlation projection”composite weighting method that can be used to clarify the intrinsic mechanism of ecological security in ski tourism destinations.Taking Chongli as a case study,this study evaluated the evolution of its ecological security from 1995 to 2023,predicted the ecological security early warning levels from 2024 to 2050,and analyzed the mechanism of influences on regional ecological security.The findings indicate that the ecological security of ski tourism destinations shows a significant“stepped leap–dynamic equilibrium”evolutionary path.The dynamic response mechanism of the subsystems is characterized by significant heterogeneity.The ecological security early warning system revealed the temporal and sequential differentiation of risk transmission.The factors influencing ecological security show the significant dual dominance of policy and climate.This paper enhances the applicability of ecological security systems within ski tourism contexts by analyzing their evolutionary characteristics,predicted future changes and impact factors,and it provides an effective case study for ecological improvement. 展开更多
关键词 ecological security ski tourism tourism destination sustainable development Beijing Winter Olympics
原文传递
AssessITS: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
2
作者 Mir Mehedi Rahman Naresh Kshetri +1 位作者 Sayed Abu Sayeed Md Masud Rana 《Journal of Information Security》 2024年第4期564-588,共25页
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act... In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards. 展开更多
关键词 CYBERsecurity Information security Risk Assessment Risk evaluation Risk Mitigation Threat Level Vulnerability Assessment
在线阅读 下载PDF
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
3
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
在线阅读 下载PDF
A Design of the Network Security Evaluation System
4
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 security evaluation security Rules evaluation Algorithm
在线阅读 下载PDF
Integrated Evaluation of Ecological Security at Different Scales Using Remote Sensing: A Case Study of Zhongxian County, the Three Gorges Area, China 被引量:27
5
作者 ZUO Wei ZHOU Hui-Zhen +3 位作者 ZHU Xiao-Hua WANG Qiao WANG Wen-Jie WU Xiu-Qin 《Pedosphere》 SCIE CAS CSCD 2005年第4期456-464,共9页
Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-... Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management. 展开更多
关键词 ecological security integrated evaluation MODELS remote sensing SCALING
在线阅读 下载PDF
Network Security Situation Evaluation Based on Modified D-S Evidence Theory 被引量:4
6
作者 WANG Chundong ZHANG YuKey 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期409-416,共8页
With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods... With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods, we propose a network security situation evaluation system based on modified D-S evidence theory is proposed. Firstly, we give a modified D-S evidence theory to improve the reliability and rationality of the fusion result and apply the theory to correlation analysis. Secondly, the attack successful support is accurately calculated by matching internal factors with external threats. Multi-module evaluation is established to comprehensively evaluate the situation of network security. Finally we use an example of actual network datasets to validate the network security situation evaluation system. The simulation result shows that the system can not only reduce the rate of false positives and false alarms, but also effectively help analysts comprehensively to understand the situation of network security. 展开更多
关键词 network security situation evaluation informationfusion D-S evidence theory Bayes network theory
原文传递
Security evaluation of compounded microbial flocculant 被引量:9
7
作者 马放 王博 +3 位作者 范春 杨基先 李百祥 刘艳滨 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第1期38-42,共5页
A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat ac... A new kind of compounded microbial flocculant (CMBF) for water and wastewater treatment has been developed through biological technology. In order to discuss its biological security, four groups of experiments, rat acute toxicity test via mouth, salmonella assay in vitro, mouse micronucleus in vivo test and teratogenesis test were conducted to evaluate its general toxicity, genotoxicity and generative toxicity. The experimental results showed that this type of compounded microbial flocculant was a substantial non-toxic substance based on the fact that LD50 value was over 10 mg/kg. The results from salmonella in vivo test and mouse micronucleus in vivo test revealed that the compounded microbial flocculant is a genetically non-toxic substance. Furthermore, compounded microbial flocculant has little effect on the growth of all the rats, and any morphologic abnormal phenomenon hasn’t appeared. 展开更多
关键词 compounded microbial flocculant (CMBF) generative toxicity genetic toxicity security evaluation
在线阅读 下载PDF
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
8
作者 Jinxin Zuo Yueming Lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
在线阅读 下载PDF
Generalized dominance-based rough set approach to security evaluation with imprecise information 被引量:3
9
作者 Zhao Liang Xue Zhi 《High Technology Letters》 EI CAS 2010年第3期254-262,共9页
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic secur... The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation. 展开更多
关键词 security evaluation grey number multi-attribute group decision-making (MAGDM) generalized dominance-based rough set approach (G-DRSA)
在线阅读 下载PDF
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation 被引量:4
10
作者 Sasith M. Rajasooriya Chris P. Tsokos Pubudu Kalpani Kaluarachchi 《Journal of Information Security》 2016年第4期269-279,共11页
The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavio... The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place. 展开更多
关键词 Stochastic Modelling security Risk evaluation Vulnerability Life Cycle Risk Factor
在线阅读 下载PDF
Paths of China’s Participation in Middle East Security Governance:From the Perspective of the Global Security Initiative
11
作者 Yu Guoqing 《Contemporary World》 2025年第5期32-38,共7页
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch... The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit. 展开更多
关键词 Middle East security Governance middle east Palestinian Israeli Conflict Major Country Responsibility security governance Global security Deficit global security initiative gsi proposed Global security Initiative
在线阅读 下载PDF
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective 被引量:3
12
作者 Yoosef BAbushark Asif Irshad Khan +5 位作者 Fawaz Jaber Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第7期1203-1218,共16页
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,framew... Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability. 展开更多
关键词 security requirements engineering cyber-security USABILITY fuzzy logic MCDM
在线阅读 下载PDF
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
13
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
Application of Security Index in Evaluation of Agricultural Insurance Security Level
14
作者 Xuan ZUO Qiao ZHANG Ke WANG 《Asian Agricultural Research》 2018年第2期39-41,共3页
At present,there is still no unified standard for evaluation of agricultural insurance security level,especially in the quantitative evaluation. In order to explore a scientific and reasonable evaluation method for ag... At present,there is still no unified standard for evaluation of agricultural insurance security level,especially in the quantitative evaluation. In order to explore a scientific and reasonable evaluation method for agricultural insurance security level,this paper analyzed the current situation of evaluation methods of social insurance,endowment insurance and medical insurance,as well as the application of security index. It is expected to provide a certain reference for evaluation of agricultural insurance security level by the agricultural insurance security index. 展开更多
关键词 Agricultural Insurance security level evaluation security index
在线阅读 下载PDF
Dynamic Tracking and Comprehensive Evaluation on the Natural Resources Security Elements and System in China
15
作者 Yao Yulong Zhou Hong 《Chinese Journal of Population,Resources and Environment》 2010年第2期32-39,共8页
System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Base... System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security. 展开更多
关键词 natural resources security indicator system dynamic tracking comprehensive evaluation
在线阅读 下载PDF
Information Security Testing Model Based on Variable Weights Fuzzy Comprehensive Evaluation
16
作者 徐洋 谢晓尧 张焕国 《China Communications》 SCIE CSCD 2011年第4期76-83,共8页
Nowadays,clear evaluation models and methods are lacking in classified protection of information system,which our country is making efforts to promote.The quantitative evaluation of classified protection of informatio... Nowadays,clear evaluation models and methods are lacking in classified protection of information system,which our country is making efforts to promote.The quantitative evaluation of classified protection of information system security is studied.An indicators system of testing and evaluation is established.Furthermore,a model of unit testing and evaluation and a model of entirety testing and evaluation are presented respectively.With analytic hierarchy process and two-grade fuzzy comprehensive evaluation,the subjective and uncertain data of evaluation will be quantitatively analyzed by comprehensive evaluation.Particularly,the variable weight method is used to model entirety testing and evaluation.It can solve the problem that the weights need to be adjusted because of the relationship role which enhances or reduces security of information system.Finally,the paper demonstrates that the model testing and evaluation can be validly used to evaluate the information system by an example.The model proposed in this paper provides a new valuable way for classified protection of information system security. 展开更多
关键词 testing and evaluation for classified protection analytic hierarchy process variable weights fuzzy comprehensive evaluation
在线阅读 下载PDF
Identification and Countermeasures for China’s Oil Security Risks under the Dual Carbon Goals
17
作者 Wang Nengquan 《China Oil & Gas》 2025年第3期11-21,共11页
This paper reviews the history and lessons of global oil crises while exploring the establishment of a quantitative evaluation model for oil security with Chinese characteristics.Using principal component analysis,it ... This paper reviews the history and lessons of global oil crises while exploring the establishment of a quantitative evaluation model for oil security with Chinese characteristics.Using principal component analysis,it constructs an oil security evaluation indicator system for China with two main-level indicators:foreign oil dependency and its impacts,and market intervention and security assurance. 展开更多
关键词 establishment quantitative evaluation model dual carbon goals principal component analysisit quantitative evaluation model foreign oil dependency market intervention security assurance principal component analysis oil security
在线阅读 下载PDF
Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model 被引量:4
18
作者 Xiaozhou Li Zhenggang Xu +3 位作者 Yuanyuan Fu Qi Jin Yunlin Zhao Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2021年第10期985-1001,共17页
Today,resource depletion threatens a number of resource-based cities in China.The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of... Today,resource depletion threatens a number of resource-based cities in China.The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities.Using 23 indicators,this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017.The results showed that from 2011 to 2015,the overall ecological security of this type of city was low,with over 60%of the cities at an unsafe level.However,ecological security improved rapidly after 2016,and by 2017,all of the cities had reached the critical safety level.The top 10 indicators of ecological security included industrial sulfur dioxide emissions,water supply,agricultural fertilizer application,and forest coverage.These 10 indicators’cumulative contribution to ecological security was 48.3%;among them,reducing industrial sulfur dioxide emissions contributed the most at 5.7%.These findings can help governments better understand the ecological security status of resource-exhausted cities,and it can provide a reference for the allocation of funds and other resources to improve the ecological safety of these cities. 展开更多
关键词 Ecological security PSR model evaluation resource-exhausted cities
在线阅读 下载PDF
New Opportunities,Challenges,and Strategies for Educational Evaluation Reform in the Era of Artificial Intelligence
19
作者 Li Jin Hua Zhang 《Journal of Contemporary Educational Research》 2025年第1期66-73,共8页
Under the rapid impetus of artificial intelligence(AI)technology,human society is stepping into the age of intelligence at an unprecedented speed.A new generation of information technology such as AI is not only a new... Under the rapid impetus of artificial intelligence(AI)technology,human society is stepping into the age of intelligence at an unprecedented speed.A new generation of information technology such as AI is not only a new engine of economic development,but also a gas pedal of social development,which has had a profound impact on the field of education.In the face of the opportunities and challenges of the AI era,it is particularly urgent to build a scientific and reasonable education evaluation system.This paper combines the context of the times with the new technology of AI to discuss the opportunities,challenges,and implementation strategies of educational evaluation reform in the era of AI,with a view to providing references for the construction of the educational evaluation system and the development of high-quality education in the new era. 展开更多
关键词 Artificial intelligence Education evaluation reform New policy Formative evaluation Value-added evaluation Multiple evaluation
在线阅读 下载PDF
Pursuing the Asian Security Model:Strategic Focuses and Practical Approaches
20
作者 Huang Dahui 《Contemporary International Relations》 2025年第4期26-35,共10页
Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for... Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for Asia that features sharing weal and woe,seeking common ground while shelving differences,and prioritizing dialogue and consultation.”1 This fully demonstrates that China prioritizes neighborhood on its diplomatic agenda,regards security and stability in its neighborhood as a core strategic support,and is ready to collaborate with neighboring countries for a future of shared peace,development,and prosperity. 展开更多
关键词 security stability security model model security Asian security common ground dialogue sharing weal woe neighborhood diplomacy
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部