期刊文献+
共找到435篇文章
< 1 2 22 >
每页显示 20 50 100
Revealing the exploitability of heap overflow through PoC analysis
1
作者 Qintao Shen Guozhu Meng Kai Chen 《Cybersecurity》 2025年第3期87-101,共15页
The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications.Prior studies have focused on using fuzzing-based methods to generate more exploitable heap... The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications.Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts.However,the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability,as it is uncertain whether the attacker can control the data covered by the overflow.In this paper,we propose the Heap Overflow Exploitability Evaluator(Hoee),a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts(PoCs)generated by fuzzers.Hoee leverages several techniques to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner.The overflow context is carefully analyzed to determine whether the sensitive pointer is corrupted,tainted,or critically used.We evaluate Hoee on 34 real-world CVE vulnerabilities from 16 general-purpose programs.The results demonstrate that Hoee accurately identifies the key factors for developing exploits in vulnerable contexts and correctly recognizes the behavior of overflow. 展开更多
关键词 exploitability evaluation Proof-of-concept Static analysis Taint analysis Heap object recovery
原文传递
Barber Optimization Algorithm:A New Human-Based Approach for Solving Optimization Problems
2
作者 Tareq Hamadneh Belal Batiha +8 位作者 Omar Alsayyed Widi Aribowo Zeinab Montazeri Mohammad Dehghani Frank Werner Haider Ali Riyadh Kareem Jawad Ibraheem Kasim Ibraheem Kei Eguchi 《Computers, Materials & Continua》 2025年第5期2677-2718,共42页
In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions ... In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains. 展开更多
关键词 Optimization METAHEURISTIC barber HAIRSTYLE human-based algorithm exploration EXPLOITATION
在线阅读 下载PDF
From Serfdom to Freedom
3
作者 Li Nan 《China's Tibet》 2025年第3期10-14,共5页
Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-... Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-holders'cruel exploitation and oppression.Padma was one of them. 展开更多
关键词 SERFDOM democratic reform EXPLOITATION Xizang THEOCRACY FEUDALISM feudal serfdom FREEDOM
在线阅读 下载PDF
Economic abuse as a female battering form:A cross-sectional study among physicians and nurses
4
作者 Elif Sarac Deniz Odabas 《World Journal of Psychiatry》 2025年第12期297-308,共12页
BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of ... BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of economic abuse on individual work performance and clarify the effective factors on financial exploitation among physicians and nurses.METHODS The study has a cross-sectional design,and 305 married,female physicians and nurses working in a university hospital were included.Data was collected with demographic characteristics forms,“Revised Scale of Economic Abuse”and“Individual Work Performance Questionnaire”.Pearson correlation,comparative analyses,and internal consistency reliability tests were used.RESULTS The average age was 39.04±9.41.Among the respondents 69.2%were nurses and 63.9%held a bachelor’s degree.The mean score for the Revised Scale of Economic Abuse was 2.80±4.73 while it was 3.86±0.60 for the Individual Work Performance Questionnaire.CONCLUSION Our study revealed no relationship between economic abuse and individual work performance,confirming that nurses are exposed to more economic abuse and exploitation than physicians and exhibit higher work performance. 展开更多
关键词 MARRIED FEMALE Physician Nurse Economic exploitation Restriction Work performance
暂未订购
Review of artificial intelligence applications in geothermal energy extraction from hot dry rock
5
作者 Kun Ji Hong Li +3 位作者 Yu Zhao Kaoshan Dai Sai Liu Chun'an Tang 《Deep Underground Science and Engineering》 2025年第4期651-672,共22页
The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technica... The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technical challenges arising from their unique characteristics of high temperature,high strength,and low permeability.With the continuous advancement of artificial intelligence(AI)technology,intelligent algorithms such as machine learning and evolutionary algorithms are gradually replacing or assisting traditional research methods,providing new solutions for HDR geothermal resource exploitation.This study first provides an overview of HDR geothermal resource exploitation technologies and AI methods.Then,the latest research progress is systematically reviewed in AI applications in HDR geothermal reservoir characterization,deep drilling,heat production,and operational parameter optimization.Additionally,this study discusses the potential limitations of AI methods in HDR geothermal resource exploitation and highlights the corresponding opportunities for AI's application.Notably,the study proposes the framework of an intelligent HDR exploitation system,offering a valuable reference for future research and practice. 展开更多
关键词 ALGORITHM artificial intelligence hot dry rock intelligent exploitation system OPTIMIZATION PREDICTION
原文传递
A Novel Approach Based on Recuperated Seed Search Optimization for Solving Mechanical Engineering Design Problems
6
作者 Sumika Chauhan Govind Vashishtha +1 位作者 Riya Singh Divesh Bharti 《Computer Modeling in Engineering & Sciences》 2025年第7期309-343,共35页
This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques strug... This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques struggle with slow convergence and suboptimal solutions due to complex,nonlinear natures.The Sperm Swarm Optimization(SSO)algorithm,which mimics the sperm’s movement to reach an egg,is one such technique.To improve SSO,researchers combined it with three strategies:opposition-based learning(OBL),Cauchy mutation(CM),and position clamping.OBL introduces diversity to SSO by exploring opposite solutions,speeding up convergence.CM enhances both exploration and exploitation capabilities throughout the optimization process.This combined approach,RSSO,has been rigorously tested on standard benchmark functions,real-world engineering problems,and through statistical analysis(Wilcoxon test).The results demonstrate that RSSO significantly outperforms other optimization algorithms,achieving faster convergence and better solutions.The paper details the RSSO algorithm,discusses its implementation,and presents comparative results that validate its effectiveness in solving complex engineering design challenges. 展开更多
关键词 Local search Cauchy mutation opposition-based learning EXPLORATION EXPLOITATION
在线阅读 下载PDF
Gender-based economic violence and the exploitation of women:A deep dive
7
作者 Elif Sarac Deniz Odabas 《World Journal of Psychiatry》 2025年第3期58-65,共8页
Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of g... Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively. 展开更多
关键词 Gender based Domestic violence Economic violence EXPLOITATION WOMEN
暂未订购
Unveiling the dark side of leadership:How exploitative leadership undermines employees’work-related flow
8
作者 Lingnan Kong Nuo Chen +1 位作者 Ruiqi Wang Shunkun Yu 《Journal of Psychology in Africa》 2025年第3期335-343,共9页
This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(... This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(females=58.17%,mean age=32.14,SD=5.83).Structural equation modeling results indicated that exploitative leadership reduces employees’work-related flow via increased role overload.Furthermore,employees’traditionality level moderates the exploitative leadership effects on role overload.Specifically,employees with higher traditionality reported lower role overload when experiencing exploitative leadership,suggesting that cultural values may buffer its negative impact.This study contributes to understanding the mechanism and contextual factors linking exploitative leadership to work-related flow,filling a gap in the literature.Organizations are encouraged to reduce exploitative leadership behaviors through leadership development programs and to consider employees’value orientations when designing work environments. 展开更多
关键词 exploitative leadership role overload work-related flow traditionality
在线阅读 下载PDF
Patterns in Heuristic Optimization Algorithms: A Comprehensive Analysis
9
作者 Robertas Damasevicius 《Computers, Materials & Continua》 2025年第2期1493-1538,共46页
Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality ... Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms. 展开更多
关键词 Heuristic optimization algorithms design patterns INITIALIZATION local search diversity maintenance ADAPTATION STOCHASTICITY exploration EXPLOITATION search space metaheuristics
在线阅读 下载PDF
Linking proactive personality to strengths use: The mediator of psychological safety and the moderator of exploitative leadership
10
作者 Wenyin Yang Zhijie Xu Yang Liu 《Journal of Psychology in Africa》 2025年第1期43-49,共7页
Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role ... Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use. 展开更多
关键词 proactive personality psychological safety exploitative leadership strengths use
在线阅读 下载PDF
A novel permeability calculation model to simultaneously quantify the impacts of pore and fracture with full feature size
11
作者 Minghui Li Banghong Zhang +4 位作者 Zhouqian Wu Shaochen Luo Jun Lu Dongming Zhang Heping Xie 《International Journal of Mining Science and Technology》 2025年第4期609-618,共10页
The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.How... The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.However,deep reservoir rock formations are subjected to complex environments with coupling of high temperature and stress.As a result,deep reservoir rocks possess a complex structure comprising of pores and fractures,making it challenging to understand their impact on permeability.Comprehending this relationship is vital for the secure and efficient exploitation of deep geological resources.This study presents a permeability calculation model that enables simultaneously quantify the impacts of pore and fracture with full feature size.The model independently considers large-scale fractures’fractal properties and tortuosity while also addressing the distribution and size of small-scale pores.A tortuosity expression that incorporates the effects of thermal damage has been developed using the pore geometric elasticity method.Considering the distinct contributions of pores and fractures to rock permeability,a comprehensive rock permeability calculation model is established.This model has two main strengths:it thoroughly characterizes the influence of pore structures on permeability at multiple scales and precisely details how fractal attributes of fractures affect permeability.To validate the applicability of the model,this study conducted seepage experiments and microscopic observations,capturing the variations in permeability under thermo-mechanical coupling,while quantifying the geometric characteristics and spatial distribution of pores and fractures within the rock.By comparing the measured permeability results,the theoretical values demonstrated a commendable fit.In comparison to previous models,this innovative approach more accurately captures various flow characteristics of the rock under the influence of thermo-mechanical coupling. 展开更多
关键词 Hot dry rock Geothermal exploitation PERMEABILITY Fracture-pore microstructure
在线阅读 下载PDF
Thermophysical-mechanical behaviors of hot dry granite subjected to thermal shock cycles and dynamic loadings
12
作者 Ju Wang Feng Dai +2 位作者 Yi Liu Hao Tan Pan Zhou 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第9期5437-5452,共16页
Exploring dynamic mechanical responses and failure behaviors of hot dry rock(HDR)is significant for geothermal exploitation and stability assessment.In this study,via the split Hopkinson pressure bar(SHPB)system,a ser... Exploring dynamic mechanical responses and failure behaviors of hot dry rock(HDR)is significant for geothermal exploitation and stability assessment.In this study,via the split Hopkinson pressure bar(SHPB)system,a series of dynamic compression tests were conducted on granite treated by cyclic thermal shocks at different temperatures.We analyzed the effects of cyclic thermal shock on the thermal-related physical and dynamic mechanical behaviors of granite.Specifically,the P-wave velocity,dynamic strength,and elastic modulus of the tested granite decrease with increasing temperature and cycle number,while porosity and peak strain increase.The degradation law of dynamic mechanical properties could be described by a cubic polynomial.Cyclic thermal shock promotes shear cracks propagation,causing dynamic failure mode of granite to transition from splitting to tensile-shear composite failure,accompanied by surface spalling and debris splashing.Moreover,the thermal shock damage evolution and coupled failure mechanism of tested granite are discussed.The evolution of thermal shock damage with thermal shock cycle numbers shows an obvious S-shaped surface,featured by an exponential correlation with dynamic mechanical parameters.In addition,with increasing thermal shock temperature and cycles,granite mineral species barely change,but the length and width of thermal cracks increase significantly.The non-uniform expansion of minerals,thermal shock-induced cracking,and water-rock interaction are primary factors for deteriorating dynamic mechanical properties of granite under cyclic thermal shock. 展开更多
关键词 Geothermal exploitation Cyclic thermal shock GRANITE Thermal-related physical properties Dynamic mechanical behavior Failure mechanism
在线阅读 下载PDF
Exploiting a No-Regret Opponent in Repeated Zero-Sum Games
13
作者 LI Kai HUANG Wenhan +1 位作者 LI Chenchen DENG Xiaotie 《Journal of Shanghai Jiaotong university(Science)》 2025年第2期385-398,共14页
In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when pl... In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when playing against a fully adaptive opponent,one would have dificulty identifying the opponent's adaptive dynamics and further exploiting its potential weakness.In this paper,we study the problem of optimizing against the adaptive opponent who uses no-regret learning.No-regret learning is a classic and widely-used branch of adaptive learning algorithms.We propose a general framework for online modeling no-regret opponents and exploiting their weakness.With this framework,one could approximate the opponent's no-regret learning dynamics and then develop a response plan to obtain a significant profit based on the inferences of the opponent's strategies.We employ two system identification architectures,including the recurrent neural network(RNN)and the nonlinear autoregressive exogenous model,and adopt an efficient greedy response plan within the framework.Theoretically,we prove the approximation capability of our RNN architecture at approximating specific no-regret dynamics.Empirically,we demonstrate that during interactions at a low level of non-stationarity,our architectures could approximate the dynamics with a low error,and the derived policies could exploit the no-regret opponent to obtain a decent utility. 展开更多
关键词 no-regret learning repeated game opponent exploitation opponent modeling dynamical system system identification recurrent neural network(RNN)
原文传递
On Relevant Problems of Formulating a Comprehensive Interaction Theory for Nonlinear Geomechanical and Physicochemical Processes Within Rock Masses
14
作者 KIRYAYEV Tatyana-alexeyevna 《辽宁大学学报(自然科学版)》 2025年第2期111-127,共17页
This study employs experimental and analytical methods to quantitatively investigate the nonlinear geomechanical and physicochemical processes of multiphase and high-stress coal-bearing rock masses and non-equilibrium... This study employs experimental and analytical methods to quantitatively investigate the nonlinear geomechanical and physicochemical processes of multiphase and high-stress coal-bearing rock masses and non-equilibrium geological materials,as well as their interactions.The research encompasses following aspects,i.e.1)the relationship between volatile matter yield,geological age,and distance from magmatic deposits in Kuzbass coalfield;2)the impact of physicochemical property bifurcations on coal and gas outbursts;3)the variation law of coalbed methane content with burial depth;4)the relaxation energy of gas content;5)the specific surface area of coal;6)the relationship between heat release and deformation waves of Kuzbass coal samples of different orders under uniaxial compression;7)the gas outbursts in different mines in Kuzbass;8)the relationship between seismic energy and gas outburst concentration in coal mines;9)the influence of piston mechanism;10)the connection operation between Langmuir equation and Oparin equation;and 11)the equation of motion for structural media.The research results have created a prerequisite for establishing a unified theory of the interaction between nonlinear geomechanics and physicochemical processes in rock masses,which is of great significance for the safe development and utilization of underground resources. 展开更多
关键词 mining engineering oil and gas reservoir exploitation volatile matter yield gas relaxation energy gas outburst
在线阅读 下载PDF
Water storage in underground mined-out space as a geothermal reservoir:Heat extraction performance and temperature evolution
15
作者 Cunli Zhu Yuejin Zhou +2 位作者 Jixiong Zhang Meng Li Zhen Li 《International Journal of Mining Science and Technology》 2025年第12期2089-2105,共17页
As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect... As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect that offers both promise and challenges.In response,this study proposes a functional backfilling method using mining solid waste to construct a high-porosity heat extraction space.The research integrates experiments,theoretical analysis,and simulations to examine the mechanical and permeability properties of solid waste backfill materials.It further aims to elucidate how flow velocity and initial temperature influence the evolution of the temperature field and the thermal performance.Results indicate that the backfill material achieves optimal mechanical strength with a glass fiber content of 10‰ and a length of 6 mm.Furthermore,the permeability of the solid waste backfill demonstrates a quadratic relationship with both axial and confining pressure.During the recovery stage,the temperature in the heat extraction space remains lower than that of the surrounding rock,with geothermal energy being extracted via convective heat transfer between the water medium and the rock.The amount of heat extracted shows a positive correlation with the flow velocity of the water medium and a negative correlation with its initial temperature. 展开更多
关键词 Mine geothermal energy Heat transfer mechanism Water storage and geothermal exploiting Deep mine space utilization
在线阅读 下载PDF
Characteristics and Measurements of Ecological Compensation in Ecosystem 被引量:33
16
作者 王让会 张慧芝 《Agricultural Science & Technology》 CAS 2008年第6期10-13,共4页
This research was to introduce the characteristics of and countermeasures for ecological compensation. From the analysis of the current situation of ecological compensation, a series of characteristics of ecological c... This research was to introduce the characteristics of and countermeasures for ecological compensation. From the analysis of the current situation of ecological compensation, a series of characteristics of ecological compensation in resource exploitation and economic development were elaborated. The principles and practical issues are complex in ecological compensation, and the corresponding object, entity, financial system of ecological compensation are the keys to set up compensation mechanism, and studying of ecosystem service function and ecological footprint calculation are important ways to quantitatively assess ecological compensation, and are also important foundations for establishing calculation system of green GDP. Advocating the benefit compensation mechanism of ecological economy and enclosing ecological compensation principle are important ways for establishing the new environmental management pattern and manifesting social justice and the ecological civilization ideas. This research proposed some views of and approaches to ecological compensation mechanism for constructing natural resource development and utilization.The establishment of ecological compensation is an important approach to prevent the imbalance of resource allocation, the system guarantee for sustainable development, and the important basis of saving resources. 展开更多
关键词 Ecological compensation ECOSYSTEM Ecological footprint Resource exploitation Environmental protection
在线阅读 下载PDF
Exploitation and Utilization of Insect Protein Feed Resources 被引量:6
17
作者 刘佳妮 徐松萍 +3 位作者 刘华青 张俨 李国涛 仇燕红 《Agricultural Science & Technology》 CAS 2017年第3期469-472,共4页
The insect is the animal protein feed resource potential, the rapid repro- duction, large quantity, high protein content, and most species of insects can be used as livestock feed utilization, development of insect as... The insect is the animal protein feed resource potential, the rapid repro- duction, large quantity, high protein content, and most species of insects can be used as livestock feed utilization, development of insect as feed resources, to pro- mote the development of China's animal husbandry and feed industry, has important significance. 展开更多
关键词 INSECT Protein feed Exploitation and utilization
在线阅读 下载PDF
BitTorrent网络的搭便车及恶意攻击研究 被引量:2
18
作者 李晓义 李治军 姜守旭 《计算机工程》 CAS CSCD 北大核心 2011年第7期163-165,共3页
通过分析BitTorrent网络中BitThief、BitTyrant、Large View exploit、Sybil、声称自己拥有文件块、仅连接种子这6种搭便车攻击和发布虚假块、不合作、Eclipse这3种恶意攻击的主要策略和攻击方法,总结搭便车攻击和恶意攻击的特点与相同... 通过分析BitTorrent网络中BitThief、BitTyrant、Large View exploit、Sybil、声称自己拥有文件块、仅连接种子这6种搭便车攻击和发布虚假块、不合作、Eclipse这3种恶意攻击的主要策略和攻击方法,总结搭便车攻击和恶意攻击的特点与相同之处以及BitTorrent存在的问题,为改进BitTorrent网络协议提供参考。 展开更多
关键词 BITTORRENT网络 搭便车攻击 恶意攻击 LARGE VIEW exploit攻击 SYBIL攻击
在线阅读 下载PDF
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process 被引量:6
19
作者 Nawa Raj Pokhrel Chris P. Tsokos 《Journal of Information Security》 2017年第2期91-105,共15页
There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the pres... There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the present study, we propose a stochastic model to quantify the risk associated with the overall network using Markovian process in conjunction with Common Vulnerability Scoring System (CVSS) framework. The model we developed uses host access graph to represent the network environment. Utilizing the developed model, one can filter the large amount of information available by making a priority list of vulnerable nodes existing in the network. Once a priority list is prepared, network administrators can make software patch decisions. Gaining in depth understanding of the risk and priority level of each host helps individuals to implement decisions like deployment of security products and to design network topologies. 展开更多
关键词 VULNERABILITY ATTACK Graph MARKOV Model exploitability CVSS FIRST NVD IDS
暂未订购
上一页 1 2 22 下一页 到第
使用帮助 返回顶部