期刊文献+
共找到41,323篇文章
< 1 2 250 >
每页显示 20 50 100
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
1
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE att&ck PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework
2
作者 Jong-Yih Kuo Ping-Feng Wang +1 位作者 Ti-Feng Hsieh Cheng-Hsuan Kuo 《Computer Modeling in Engineering & Sciences》 2025年第6期3133-3166,共34页
In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularl... In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularly as Linux platforms—historically overlooked in favor of Windows—have emerged as frequent targets.According to Trend Micro,there has been a substantial increase in Linux-targeted malware,with ransomware attacks on Linux surpassing those on macOS.This alarming trend underscores the need for detection strategies specifically designed for Linux environments.To address this challenge,this study proposes a comprehensive malware detection framework tailored for Linux systems,integrating dynamic behavioral analysis with the semantic reasoning capabilities of large language models(LLMs).Malware samples are executed within sandbox environments to extract behavioral features such as system calls and command-line executions.These features are then systematically mapped to the MITRE ATT&CK framework,incorporating its defined data sources,data components,and Tactics,Techniques,and Procedures(TTPs).Two mapping constructs—Conceptual Definition Mapping and TTP Technical Keyword Mapping—are developed from official MITRE documentation.These resources are utilized to fine-tune an LLM,enabling it to semantically interpret complex behavioral patterns and infer associated attack techniques,including those employed by previously unknown malware variants.The resulting detection pipeline effectively bridges raw behavioral data with structured threat intelligence.Experimental evaluations confirm the efficacy of the proposed system,with the fine-tuned Gemma 2B model demonstrating significantly enhanced accuracy in associating behavioral features with ATT&CK-defined techniques.This study contributes a fully integrated Linux-specific detection framework,a novel approach for transforming unstructured behavioral data into actionable intelligence,improved interpretability of malicious behavior,and a scalable training process for future applications of LLMs in cybersecurity. 展开更多
关键词 Linux malware dynamic analysis behavior analysis behavioral feature att&ck SANDBOX large language model fine-tuning
在线阅读 下载PDF
基于ATT&CK矩阵的企业网络安全应急预案研究
3
作者 姚宏 张万臣 +2 位作者 谷彦章 高敬媛 童夏敏 《中国宽带》 2026年第1期57-59,共3页
随着信息技术的飞速发展,企业面临的网络安全威胁日益复杂多样。ATT&CK矩阵作为一种全面描述攻击者战术、技术和过程的框架,可为企业网络安全应急预案的制定提供有力支持。本文深入探讨基于ATT&CK矩阵构建企业网络安全应急预案... 随着信息技术的飞速发展,企业面临的网络安全威胁日益复杂多样。ATT&CK矩阵作为一种全面描述攻击者战术、技术和过程的框架,可为企业网络安全应急预案的制定提供有力支持。本文深入探讨基于ATT&CK矩阵构建企业网络安全应急预案的必要性、方法与流程,并结合实际案例分析其应用效果,旨在为企业提升网络安全应急响应能力提供参考。 展开更多
关键词 att&ck矩阵 网络安全 应急预案 应急响应
在线阅读 下载PDF
Planting nitrogen-rich motif into porous aromatic frameworks to boost redox potential and multi-ion storage for wide-temperature sodium-organic batteries
4
作者 Mimi Zhang Linqi Cheng +3 位作者 Zhaoli Liu Fengchao Cui Fang Luo Heng-Guo Wang 《Science China Chemistry》 2026年第2期979-985,共7页
Redox-active porous aromatic frameworks(PAFs)have emerged as hopeful candidates for sodium-ion batteries(SIBs)in view of their porous structures,chemical stability and tunable architectures.Herein,we successfully synt... Redox-active porous aromatic frameworks(PAFs)have emerged as hopeful candidates for sodium-ion batteries(SIBs)in view of their porous structures,chemical stability and tunable architectures.Herein,we successfully synthesized two redox-active PAFs(PAF-305 and PAF-306)with different nitrogen-containing motifs,and demonstrated their application as cathode materials for SIBs.Density functional theory(DFT)calculations reveal that nitrogen-rich PAF-305 exhibits a lower lowest unoccupied molecular orbital(LUMO)energy level(-3.35 eV)and a narrower energy gap(E_(g))(2.40 eV)compared with nitrogen-poor PAF-306.As expected,PAF-305 displays outstanding electrochemical performance,comprising a high reversible capacity of 145.2 mAh g^(-1)at 0.05 A g^(-1)and satisfactory cycling stability with 92% capacity retention over 1000 cycles at 0.2 A g^(-1).Remarkably,PAF-305 maintains robust electrochemical properties across a wide temperature range(-20℃ to 50℃).Through a combination of experimental characterizations and theoretical calculations,the sodium-ion storage mechanism of PAF-305 is elucidated.This study not only provides a promising strategy for exploring other redox-active organic units in the design of novel PAFs,but also expands the potential applications of PAFs in energy storage systems. 展开更多
关键词 porous aromatic framework nitrogen-rich motif multi-ion storage wide temperature sodium-organic batteries
原文传递
Confining Li^(+)Solvation in Core-Shell Metal-Organic Frameworks for Stable Lithium Metal Batteries at 100℃
5
作者 Minh Hai Nguyen Jeongmin Shin +3 位作者 Mee-Ree Kim Quan Van Nguyen JinHyeok Cha Sangbaek Park 《Nano-Micro Letters》 2026年第4期718-734,共17页
The practical deployment of lithium metal batteries remains severely constrained,especially under elevated temperatures.Although metal-organic frameworks(MOFs)improve the thermal stability of liquid electrolytes by ca... The practical deployment of lithium metal batteries remains severely constrained,especially under elevated temperatures.Although metal-organic frameworks(MOFs)improve the thermal stability of liquid electrolytes by capturing them in well-ordered sub-nanopores,interparticle voids between MOF particles readily absorb liquid electrolyte,obscuring our understanding of the intrinsic role of nanopores in directing Li^(+)transport.To address this challenge,we introduce a one-dimensional(1D)MOF model architecture that eliminates interparticle effects and enables direct observation of Li^(+)solvation and de-solvation dynamics.Comparative studies of 1D HKUST-1 and ZIF-8 uncover distinct transport behaviors,supported by both experimental measurements and neural network potential-based molecular dynamics simulations.Building on these insights,we construct a hierarchical core-shell MOF architecture by integrating ZIF-8(core)and HKUST-1(shell)onto a hybrid fiber scaffold.This design harnesses the complementary strengths of both MOFs to achieve continuous ion pathways,directional Li^(+)conduction,and improved thermal and electrochemical resilience. 展开更多
关键词 Quasi-solid-state electrolyte Metal-organic frameworks Li metal batteries Thermal stability Lithium-ion solvation/de-solvation
在线阅读 下载PDF
Analysis and Defense of Attack Risks under High Penetration of Distributed Energy
6
作者 Boda Zhang Fuhua Luo +3 位作者 Yunhao Yu Chameiling Di Ruibin Wen Fei Chen 《Energy Engineering》 2026年第2期206-228,共23页
The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems(CPDS).While enabling advanced functionalities,the tight interdependence between cyber and phy... The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems(CPDS).While enabling advanced functionalities,the tight interdependence between cyber and physical layers introduces significant security challenges and amplifies operational risks.To address these critical issues,this paper proposes a comprehensive risk assessment framework that explicitly incorporates the physical dependence of information systems.A Bayesian attack graph is employed to quantitatively evaluate the likelihood of successful cyber attacks.By analyzing the critical scenario of fault current path misjudgment,we define novel system-level and node-level risk coupling indices to preciselymeasure the cascading impacts across cyber and physical domains.Furthermore,an attack-responsive power recovery optimization model is established,integrating DistFlowbased physical constraints and sophisticated modeling of information-dependent interference.To enhance resilience against varying attack scenarios,a defense resource allocation model is constructed,where the complex Mixed-Integer Nonlinear Programming(MINLP)problem is efficiently linearized into a Mixed-Integer Linear Programming(MILP)formulation.Finally,to mitigate the impact of targeted attacks,the optimal deployment of terminal defense resources is determined using a Stackelberg game-theoretic approach,aiming to minimize overall system risk.The robustness and effectiveness of the proposed integrated framework are rigorously validated through extensive simulations under diverse attack intensities and defense resource constraints. 展开更多
关键词 CPDS cyber-physical interdependence Bayesian attack graph Stackelberg game risk assessment framework power recovery resource allocation
在线阅读 下载PDF
Controllable morphological transformations of nickel metal-organic frameworks for nickel-zinc batteries
7
作者 Guang-Xun Zhang Hui Yang +5 位作者 Wan-Chang Feng Qiu-Jing Wang Han-Yi Chen Mohsen Shakouri Song-Qing Chen Huan Pang 《Rare Metals》 2025年第5期2976-2985,共10页
Constructing hierarchical nanostructures with highly exposed surfaces is a promising strategy for developing advanced cathode materials in aqueous batteries.Herein,we employed a competitive coordination strategy to op... Constructing hierarchical nanostructures with highly exposed surfaces is a promising strategy for developing advanced cathode materials in aqueous batteries.Herein,we employed a competitive coordination strategy to optimize the characteristics of nickel metal-organic framework(Ni-MOF).Specifically,the acetate ions were employed as precise regulators,exerting a distinct influence on the morphology of the Ni-MOF and leading to a structural transition from a block structure to a two-dimensional(2D)layered structure.The optimized Ni-MOF exhibits a unique superstructure composed of hierarchical 2D layers assembled into flower-like architectures.This distinctive superstructure increases the electrochemically active surface area of Ni-MOF(N-2)and provides abundant pathways for electron/ion transfer,thereby facilitating efficient electrochemical reactions.Remarkably,the assembled aqueous alkaline N-2//Zn battery demonstrated enhanced specific capacity(0.446 mAh·cm^(-2)at 1 mA·cm^(-2))and excellent maximum energy/power density(0.789 mWh·cm^(-2)/17.262 mW·cm^(-2)).This work not only offers valuable insights into regulating MOF morphology,but also makes a contribution toward enhancing the application potential of MOFs in aqueous batteries. 展开更多
关键词 Metal-organic framework TWO-DIMENSIONAL SUPERSTRUCTURES Nickel-zinc batteries
原文传递
Bimetallic zeolitic imidazolate framework derived hollow layered double hydroxide with tailorable interlayer spacing for nickel-zinc batteries
8
作者 Hui Yang Guangxun Zhang +2 位作者 Yueyao Sun Huijie Zhou Huan Pang 《Chinese Chemical Letters》 2025年第6期733-738,共6页
Rationally design the morphology and structure of electroactive nanomaterials is an effective approach to enhance the performance of aqueous batteries.Herein,we co-engineered the hollow architecture and interlayer spa... Rationally design the morphology and structure of electroactive nanomaterials is an effective approach to enhance the performance of aqueous batteries.Herein,we co-engineered the hollow architecture and interlayer spacing of layered double hydroxides(LDH)to achieve high electrochemical activity.The hierarchical hollow LDH was prepared from bimetallic zeolitic imidazolate frameworks(ZIF)by a facile cation exchange strategy.Zn and Cu elements were selected as the second metals incorporated in Co-ZIF.The characteristics of the corresponding derivatives were studied.Besides,the transformation mechanism of CoZn-ZIF into nanosheet-assembled hollow Co Zn Ni LDH(denoted as CoZnNi-OH)was systematically investigated.Importantly,the interlayer spacing of CoZnNi-OH expands due to Zn^(2+)incorporation.The prepared CoZnNi-OH offers large surface area,exposed active sites,and rapid mass transfer/diffusion rate,which lead to a significant enhancement in the specific capacitance,rate performance,and cycle stability of CoZnNi-OH electrode.In addition,the aqueous alkaline CoZnNi-OH//Zn showed a maximum energy density/power density of 0.924 m Wh/cm^(2),8.479 m W/cm^(2).This work not only raises an insightful strategy for regulating the morphology and interlayer spacing of LDH,but also provides a reference of designing hollow nickel-based nanomaterials for aqueous batteries. 展开更多
关键词 Nickel-zinc battery HOLLOW Interlayer spacing Layered double hydroxide Zeolitic imidazolate framework
原文传递
基于ATT&CK框架的智能系统攻击威胁分析研究
9
作者 张德治 刘霁莹 《通信技术》 2025年第9期1020-1028,共9页
随着人工智能技术的发展,智能系统在各领域得到大量应用,由于智能系统的联网特性、复杂性和与物理世界的深度交互,因此其成为网络攻击的主要目标,安全问题日益突出。通过研究对比各类攻击威胁建模技术适用范围和局限性,采用ATT&CK框... 随着人工智能技术的发展,智能系统在各领域得到大量应用,由于智能系统的联网特性、复杂性和与物理世界的深度交互,因此其成为网络攻击的主要目标,安全问题日益突出。通过研究对比各类攻击威胁建模技术适用范围和局限性,采用ATT&CK框架,并结合开源情报信息,对智能系统特有的攻击威胁进行归类总结,形成针对智能系统攻击威胁的14类战术,并在攻击威胁建模成果的基础上,提出包括强化智能系统基础软件安全、模型和算法安全、智能系统运行过程安全等有针对性的安全措施,为智能系统的安全防御设计提供支撑。 展开更多
关键词 人工智能 智能系统 att&ck 威胁模型
在线阅读 下载PDF
基于ATT&CK框架的攻击检测系统设计 被引量:2
10
作者 陈玉杰 陈俊丽 张汉举 《计算机技术与发展》 2025年第10期89-97,共9页
随着计算机技术的蓬勃发展和网络攻击手段的日益繁杂,网络安全防护面临着严峻挑战。针对企事业单位对于网络攻击的检测维度单一、范围狭隘以及无法及时察觉到攻击者的潜伏驻留点和快速溯源这一现状,该文设计了基于ATT&CK框架的攻击... 随着计算机技术的蓬勃发展和网络攻击手段的日益繁杂,网络安全防护面临着严峻挑战。针对企事业单位对于网络攻击的检测维度单一、范围狭隘以及无法及时察觉到攻击者的潜伏驻留点和快速溯源这一现状,该文设计了基于ATT&CK框架的攻击检测系统,为企事业单位打造一道坚固的网络安全防线。该系统深度挖掘ATT&CK框架所蕴含的丰富技战术知识库资源,通过自然语言处理技术提取攻击技术描述中具有关键指示意义的动名词组合,为构建精准且全面的检测规则提供核心依据,实现对于网络攻击的全面检测。基于检测到的攻击行为,对攻击行为进行特征提取,获取其中的时间戳、来源IP、目标IP等信息,根据提取到的信息利用K-means聚类算法实现对攻击行为的智能分类和有序组织。以时间序列为脉络,深度梳理攻击行为的先后逻辑关系,构建完整且有序的攻击链路,从而实现快速定位到攻击者当前的驻留点以及攻击发生过后的快速溯源,有力保障企事业单位网络环境的安全稳定。 展开更多
关键词 att&ck框架 攻击检测 技战术知识库 检测规则 攻击链路
在线阅读 下载PDF
基于ATT&CK框架的网络安全产品能力评估 被引量:2
11
作者 李士奇 卞建超 陈妍 《微型计算机》 2025年第3期82-84,共3页
网络安全产品的检测与评估多是针对产品的功能和安全保障措施进行合规性检测,较少涉及安全功能有效性和实际防护能力等方面的评估。ATT&CK框架将攻击技术战术标准化,可实现客观评估网络安全产品的实际防护能力,但现有方案在技战术... 网络安全产品的检测与评估多是针对产品的功能和安全保障措施进行合规性检测,较少涉及安全功能有效性和实际防护能力等方面的评估。ATT&CK框架将攻击技术战术标准化,可实现客观评估网络安全产品的实际防护能力,但现有方案在技战术覆盖和能力量化分析方面仍有不足。本文提出了一种基于ATT&CK框架构建攻击路径知识库,模拟高频攻击路径开展网络安全产品能力评估的方案,并通过构建了多维能力评价机制,实现对网络安全产品实际防护能力的量化评估。本文通过对某型产品开展的能力评估,验证了本方案的可行性和有效性。 展开更多
关键词 网络安全 att&ck框架 攻击路径 产品能力评估
在线阅读 下载PDF
基于ATT&CK框架与图神经网络的智能网络安全防御系统 被引量:1
12
作者 刘乃先 《中国科技论文在线精品论文》 2025年第3期21-23,共3页
为应对高级持续性威胁(APT)等复杂网络攻击,本文提出并实现了一种融合ATT&CK框架与图神经网络(GNN)的智能网络安全防御系统。该系统利用ATT&CK构建标准化攻击知识图谱,通过GNN对多源异构安全数据进行动态图建模与深度关联分析,... 为应对高级持续性威胁(APT)等复杂网络攻击,本文提出并实现了一种融合ATT&CK框架与图神经网络(GNN)的智能网络安全防御系统。该系统利用ATT&CK构建标准化攻击知识图谱,通过GNN对多源异构安全数据进行动态图建模与深度关联分析,实现复杂攻击链的实时识别与潜在攻击路径预测,显著提升威胁检测精度与响应速度。 展开更多
关键词 人工智能 att&ck框架 图神经网络(GNN) 网络安全 威胁检测 攻击链 主动防御 实用系统
在线阅读 下载PDF
基于MITRE ATT&CK框架强化网络安全的策略研究
13
作者 黄晓昆 陈烁 +1 位作者 姚日煌 鹿洵 《电子质量》 2025年第6期38-44,共7页
提出了一种基于MITRE ATT&CK框架的智能化告警处理策略,通过融合多参数优先级模型、图神经网络和深度学习时序建模技术,构建了动态高效的网络安全防护系统。实验结果表明,该策略在检测准确率、误报控制及响应时效性等关键指标上均... 提出了一种基于MITRE ATT&CK框架的智能化告警处理策略,通过融合多参数优先级模型、图神经网络和深度学习时序建模技术,构建了动态高效的网络安全防护系统。实验结果表明,该策略在检测准确率、误报控制及响应时效性等关键指标上均显著优于传统方法,为应对复杂网络威胁提供了创新性解决方案。 展开更多
关键词 MITRE att&ck框架 图神经网络 时序建模 网络安全 防御策略
在线阅读 下载PDF
基于ATT&CK框架和Bert模型的恶意代码同源性分析方法
14
作者 郑啸宇 林九川 +1 位作者 陈文萱 姚昕羽 《计算机与现代化》 2025年第8期57-62,共6页
当前,恶意程序攻击是威胁网络空间安全的主要因素之一。通过对已知组织的恶意程序开展分析,并依托相似特征对未知恶意程序开展同源性判定,有助于识别未知恶意程序和归因攻击组织。但现有的同源性分析模型存在人工提取特征复杂度高、不... 当前,恶意程序攻击是威胁网络空间安全的主要因素之一。通过对已知组织的恶意程序开展分析,并依托相似特征对未知恶意程序开展同源性判定,有助于识别未知恶意程序和归因攻击组织。但现有的同源性分析模型存在人工提取特征复杂度高、不适用于大规模分析场景、效率低、未深入考虑攻击行为间传递关系等问题。本文提出一种基于ATT&CK框架和Bert模型的同源性识别模型,通过ATT&CK框架中的高维度的攻击技术和战术,解决静态特征面对代码混淆、多态等情况导致的同源识别准确率低的问题。并利用Bert模型,有效融合恶意代码的多维特征,解决以循环神经网络为主的分析方法对序列建模不足的问题。实验结果表明,本文提出的方案可有效识别恶意代码间的同源性。 展开更多
关键词 恶意代码 同源性分析 att&ck框架 Bert模型
在线阅读 下载PDF
基于等保2.0验证测试与ATT&CK攻击矩阵的融合实践
15
作者 颜星晨 张鑫 +1 位作者 周志洪 陈恺凡 《网络安全与数据治理》 2025年第9期15-21,共7页
围绕网络安全等级保护2.0制度框架下的渗透测试方法展开研究,结合ATT&CK攻击矩阵构建动态化安全验证体系。通过对等保2.0中安全通信网络、安全区域边界、安全计算环境等核心控制点的技术验证要求进行深入分析,将传统渗透测试流程与A... 围绕网络安全等级保护2.0制度框架下的渗透测试方法展开研究,结合ATT&CK攻击矩阵构建动态化安全验证体系。通过对等保2.0中安全通信网络、安全区域边界、安全计算环境等核心控制点的技术验证要求进行深入分析,将传统渗透测试流程与ATT&CK战术技术相融合,提出多维度测试场景设计、攻击链闭环验证和防御能力量化评估三位一体的新型验证框架。选取工控系统典型场景进行实证分析,证明该方法能有效发现等保合规盲区,提升系统主动防御能力和实战对抗水平。研究结果为网络运营者落实等保制度提供了可操作的渗透测试方案,推动网络安全防护从合规导向转向能力导向。 展开更多
关键词 网络安全等级保护 att&ck 渗透测试
在线阅读 下载PDF
基于ATT&CK的多维网络靶场属性刻画模型及其相似性算法
16
作者 杨望 马鸣宇 卞郡菁 《信息网络安全》 北大核心 2025年第7期1063-1073,共11页
网络靶场在网络安全人才培养、入侵检测和漏洞识别等方面发挥着重要作用。现有的网络靶场构建方法存在参数建模效率低、人工参与度高等问题,难以满足日益复杂的网络安全需求。为提升网络靶场构建效率,研究者们尝试改进现有模型并提出新... 网络靶场在网络安全人才培养、入侵检测和漏洞识别等方面发挥着重要作用。现有的网络靶场构建方法存在参数建模效率低、人工参与度高等问题,难以满足日益复杂的网络安全需求。为提升网络靶场构建效率,研究者们尝试改进现有模型并提出新方案,但仍面临系统化建模方法欠缺等挑战。针对这些问题,文章提出基于ATT&CK的多维网络靶场属性刻画模型及其相似性算法。首先,改进并扩展ATT&CK框架,提出多维靶场属性刻画模型;然后,基于该模型设计靶场安全属性多维矩阵及相似性表示方法,通过形式化手段实现属性系统化建模;最后,在仿真环境中验证模型和算法的有效性。实验结果表明,该方法能显著提高靶场构建效率并降低人工参与度。 展开更多
关键词 att&ck框架 网络靶场 相似性算法 属性刻画模型
在线阅读 下载PDF
Mission decision-making method of multi-aircraft cooperatively attacking multi-target based on game theoretic framework 被引量:23
17
作者 Yao Zongxin Li Ming +1 位作者 Chen Zongji Zhou Rui 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2016年第6期1685-1694,共10页
Coordinated mission decision-making is one of the core steps to effectively exploit the capabilities of cooperative attack of multiple aircrafts. However, the situational assessment is an essential base to realize the... Coordinated mission decision-making is one of the core steps to effectively exploit the capabilities of cooperative attack of multiple aircrafts. However, the situational assessment is an essential base to realize the mission decision-making. Therefore, in this paper, we develop a mission decision-making method of multi-aircraft cooperatively attacking multi-target based on situational assessment. We have studied the situational assessment mathematical model based on the Dempster-Shafer(D-S) evidence theory and the mission decision-making mathematical model based on the game theory. The proposed mission decision-making method of antagonized airfight is validated by some simulation examples of a swarm of unmanned combat aerial vehicles(UCAVs)that carry out the mission of the suppressing of enemy air defenses(SEAD). 展开更多
关键词 Antagonized airfight D-S evidence theory Fuzzy mapping function Game theoretic framework Mission decision-making Multi-aircraft coordination Situational assessment
原文传递
Metal–organic framework-derived Co_(3)O_(4)modified nickel foam-based dendrite-free anode for robust lithium metal batteries 被引量:6
18
作者 Tao Wei Jiahao Lu +5 位作者 Pan Zhang Guang Yang Cheng Sun Yanyan Zhou Quanchao Zhuang Yongfu Tang 《Chinese Chemical Letters》 SCIE CAS CSCD 2023年第8期382-386,共5页
For several decades,the promise of implementing of lithium(Li)metal anodes for Li batteries has been a"holy grail"for researchers.Herein,we have proposed a facile design of a MOF-derived Co_(3)O_(4)nanoparti... For several decades,the promise of implementing of lithium(Li)metal anodes for Li batteries has been a"holy grail"for researchers.Herein,we have proposed a facile design of a MOF-derived Co_(3)O_(4)nanoparticles modified nickel foam,i.e.,Co_(3)O_(4)-NF,as a 3D host to achieve a uniform infusion of the molten Li.The molten Li was uniformly absorbed on the Co_(3)O_(4)-NF host only in 10 s due to its high Li lithiophilicity.The obtained Li-Co_(3)O_(4)-NF composite electrode shows high cycling stability in symmetric cells with low voltage hysteresis even at a high current density of 5 mA/cm2.The full cells of Li-Co_(3)O_(4)-NF/LiFePO_(4)can cycle for more than 500 cycles at 2C without obvious capacity decay.SEM after cycling and in situ optical microscope results suggest that the unique 3D host structure of the Li-Co_(3)O_(4)-NF anode plays key roles on suppressing the dendrite growth and decreasing the local current inhomogeneity.We believe this work might provide a new strategy for fabricating dendrite-free Li metal anodes and facilitate practical applications in Li batteries. 展开更多
关键词 All solid-state lithium-ion batteries Metal-organic frameworks(MOFs) Lithium metal anodes Dendrite-free anode Three-dimensional anode
原文传递
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks 被引量:1
19
作者 So-Eun Jeon Sun-Jin Lee +5 位作者 Eun-Young Lee Yeon-Ji Lee Jung-Hwa Ryu Jung-Hyun Moon Sun-Min Yi Il-Gu Lee 《Computers, Materials & Continua》 SCIE EI 2023年第5期4231-4253,共23页
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticu... Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security threats.In particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing considerably.Advanced persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated attack.However,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such attacks.In this paper,we propose a method that expands the detection coverage inAPT attack environments.In this model,an open-source threat detector and log collector are used synergistically to improve threat detection performance.Extending the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log collector.The proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods. 展开更多
关键词 Advanced persistent threat CYBERSECURITY endpoint security MITRE att&ck open-source threat detector threat log collector
在线阅读 下载PDF
A N-doped carbon with encapsulated Fe and Co particles derived from a metal organic framework for use as the anode in lithium-ion batteries
20
作者 CHEN Ren-tian ZHU Yu-xin +5 位作者 LUO Rui JIANG Xiao-nuo SI Hong-xiang QIU Xiang-yun WANG Qian WEI Tao 《新型炭材料(中英文)》 北大核心 2025年第2期363-376,共14页
Metal-organic frameworks(MOFs)are import-ant as possible energy storage materials.Nitrogen-doped iron-cobalt MOFs were synthesized by a one-pot solvo-thermal method using CoCl_(3)·6H_(2)O and FeCl_(3)·6H_(2)... Metal-organic frameworks(MOFs)are import-ant as possible energy storage materials.Nitrogen-doped iron-cobalt MOFs were synthesized by a one-pot solvo-thermal method using CoCl_(3)·6H_(2)O and FeCl_(3)·6H_(2)O dis-solved in N,N-dimethylformamide,and were converted into Fe-Co embedded in N-doped porous carbon polyhedra by pyrolysis in a nitrogen atmosphere.During pyrolysis,the or-ganic ligands transformed into N-doped porous carbon which improved their structural stability and also their electrical contact with other materials.The Fe and Co are tightly bound together because of their encapsulation by the carbon nitride and are well dispersed in the carbon matrix,and improve the material’s conductivity and stability and provide additional capacity.When used as the anode for lithium-ion batteries,the material gives an initial capacity of up to 2230.7 mAh g^(-1)and a reversible capa-city of 1146.3 mAh g^(-1)is retained after 500 cycles at a current density of 0.5 A g^(-1),making it an excellent candidate for this purpose. 展开更多
关键词 Metal-organic frameworks FeCo alloy Lithium-ion battery Anode materials
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部