期刊文献+
共找到959篇文章
< 1 2 48 >
每页显示 20 50 100
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things
1
作者 Amjad Khan Rahim Khan +1 位作者 Fahad Alturise Tamim Alkhalifah 《Computers, Materials & Continua》 2025年第2期3161-3178,共18页
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in... The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT. 展开更多
关键词 internet of Things information security AUTHENTICATION hidden Markov model MULTIMEDIA
在线阅读 下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
2
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded internet terminal (EIT) algorithm information security
在线阅读 下载PDF
A dynamic algorithm for trust inference based on double DQN in the internet of things
3
作者 Xiaodong Zhuang Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1024-1034,共11页
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t... The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability. 展开更多
关键词 internet of things information security Reinforcement learning Trust propagation Trust inference
在线阅读 下载PDF
Relationship between Internet access to agricultural information and postharvest yield loss:evidence from maize growers in China
4
作者 Yi LUO Xue QU +4 位作者 Kunyang ZHANG Yonghao HU Fangfang CAO Laping WU Junfeng ZHU 《Frontiers of Agricultural Science and Engineering》 2025年第4期793-802,共10页
Based on survey data from 832 maize growers of four major maize production regions in China,on-farm maize losses were assessed and the effects of Internet access to agricultural information on the losses were evaluate... Based on survey data from 832 maize growers of four major maize production regions in China,on-farm maize losses were assessed and the effects of Internet access to agricultural information on the losses were evaluated.The results showed that on average 4.5%,4.0%and 3.7%of maize was lost in the harvest,drying and storage stages,respectively.This indicated that at the farm level,19 Mt of maize is lost annually in China,and these losses have considerable economic,resource and environmental impacts.Additionally,Internet-based access to agricultural information was found to be positively related to reduced maize losses.Compared with farmers who do not access agricultural information from the Internet,farmers with Internet-based access to agricultural information experienced 3.2%,1.5%and 3.6%lower losses in the maize harvest,drying,and storage stages,respectively.Therefore,enhancing farmers access to agricultural information could increase the maize supply by 7.89 Mt and enhance the utilization of 1.02 Mha of farmland.Additionally,0.39 Mt of fertilizer could be saved,and the carbon emission and water usage could be reduced.It is recommended that the government accelerate the removal of barriers to farmers using the Internet to access agricultural information. 展开更多
关键词 Agricultural information China food security maize loss the internet
原文传递
How Does the Internet Impact the Public's Perception of Information Security Risk? 被引量:1
5
作者 Yi Chengzhi 《Social Sciences in China》 2024年第2期184-206,共23页
Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still... Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still under-explored.This paper empirically examines the relationship between internet use and information security risk perception based on data from the 2021 Chinese Social Survey.It was found that whether to use the internet and the frequency of use are both significantly positively correlated with the perception of information security risk.On this basis,the mechanism by which internet use affects public information security risk perceptions is verified from the perspective of interpersonal trust.The mechanism analysis found that interpersonal trust exerts an indirect effect between internet use and perceived information security risk.The findings of this study provide new insights for our further understanding of how internet use affects residents'perceptions of securityrisk. 展开更多
关键词 internet use PUBLIC perceived information security risk
原文传递
Privacy,National Security,and Internet Economy:An Explanation of China's Personal Information Protection Legislation
6
作者 QU Bo HUO Changxu 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期339-366,共28页
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc... With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation. 展开更多
关键词 LEGISLATION personal information protection national security internet industry PRIVACY cybersecurity law
原文传递
基于Internet/Intranet的供应链节点企业信息安全分析 被引量:3
7
作者 汪海航 李琼 +1 位作者 葛勤耕 魏辉 《计算机工程与应用》 CSCD 北大核心 2003年第4期30-32,共3页
文章首先综合分析了基于Internet/Intranet的供应链节点企业的一般信息模型,并从Internet和Intranet两个方面对供应链节点企业的信息安全问题进行了较为深入的探讨;进而提出了供应链企业的信息安全保护体系以及安全体系框架的参考模型;... 文章首先综合分析了基于Internet/Intranet的供应链节点企业的一般信息模型,并从Internet和Intranet两个方面对供应链节点企业的信息安全问题进行了较为深入的探讨;进而提出了供应链企业的信息安全保护体系以及安全体系框架的参考模型;最后给出了供应链节点企业信息资源安全等级划分的目标、原则及其解决方案。 展开更多
关键词 internet intranet 信息安全 企业网络 供应链 信息模型 参考模型 计算机网络
在线阅读 下载PDF
基于Intranet/Extranet/Internet的企业质量管理信息系统 被引量:21
8
作者 吕庆领 唐晓青 《计算机集成制造系统-CIMS》 EI CSCD 北大核心 2002年第9期724-727,共4页
随着供应链、虚拟企业等扩展企业组织模式的出现 ,基于企业Intranet的质量管理信息系统已不能满足现代企业质量管理的需要。因此 ,传统的面向企业内部的质量管理模式已随着产品开发与制造过程的延伸而拓展 ,出现了以核心企业为中心、以... 随着供应链、虚拟企业等扩展企业组织模式的出现 ,基于企业Intranet的质量管理信息系统已不能满足现代企业质量管理的需要。因此 ,传统的面向企业内部的质量管理模式已随着产品开发与制造过程的延伸而拓展 ,出现了以核心企业为中心、以扩展企业为整体的质量管理模式 ,企业质量管理信息系统围绕企业内部和外部运行两方面 ,实现质量管理的信息、功能和过程的集成。在扩展企业质量管理模式研究的基础上 ,针对制造企业 ,提出了面向扩展企业的、基于Internet Extranet Intranet的企业质量管理信息系统 ,研究了系统模型和功能模型 ,提出了系统实现的体系结构。 展开更多
关键词 intranet EXTRANET internet 企业 质量管理信息系统 系统模型 功能模型
在线阅读 下载PDF
开放安全的Internet/Intranet信息系统体系结构的研究与实现 被引量:28
9
作者 曹勇 吴功宜 《计算机工程与应用》 CSCD 北大核心 2000年第1期108-114,共7页
由于WWW技术的迅猛发展与普及,特别是其开放的体系结构,使得它成为当今计算机应用的理想平台。如今,许多应用,尤其是商业领域的应用,已经在WWW上成功地建立起来。但是传统的客户/服务器数据库管理系统与WWW互连还存在许... 由于WWW技术的迅猛发展与普及,特别是其开放的体系结构,使得它成为当今计算机应用的理想平台。如今,许多应用,尤其是商业领域的应用,已经在WWW上成功地建立起来。但是传统的客户/服务器数据库管理系统与WWW互连还存在许多问题,特别是在一些全新的商业应用提出后,这种问题愈显突出。正是在这种背景下,笔者研究了目前 Client/Server DBMS与 WWW互连中存在的困难和障碍,分析了问题的实质,并提出全新的开放安全 In-ternet/Intranet信息系统体系结构,对该体系结构的各组成部分进行了详细的定义和研究。在理论研究的基础上,及Intranet环境中,设计并实现了一个简单的数据库信息实时发布系统,验证了所取得的部分理论成果,同时以该系统作为基础,还可进一步开发成为实用的商业软件系统。 展开更多
关键词 信息系统 体系结构 internet intranet
在线阅读 下载PDF
基于Internet/Intranet的大型工程管理信息系统的设计与实现 被引量:10
10
作者 涂辉 陈学广 《武汉理工大学学报(交通科学与工程版)》 北大核心 2003年第1期25-28,共4页
传统的项目管理在工程数据的及时采集和处理等方面存在着不足 ,基于 Internet/Intranet的分布式管理信息系统能较好地解决这一问题 .文中提出了一种采用 WWW-Client/Server体系结构的大型工程管理信息系统设计方案 ,并综合利用 Power Bu... 传统的项目管理在工程数据的及时采集和处理等方面存在着不足 ,基于 Internet/Intranet的分布式管理信息系统能较好地解决这一问题 .文中提出了一种采用 WWW-Client/Server体系结构的大型工程管理信息系统设计方案 ,并综合利用 Power Builder,PHP等工具使该系统得以成功开发 。 展开更多
关键词 internet/intranet 分布式系统 大型工程 管理信息系统 轨道交通工程
在线阅读 下载PDF
矿山企业Internet/Intranet网站的实施方案 被引量:1
11
作者 李贺松 陈建宏 《矿冶》 EI CAS 2001年第4期76-81,共6页
提出矿山企业Internet/Intranet网站的实施方案。论述了网络操作系统、后台数据库、Web服务器、Web网页开发技术等的选择 ,探讨了通讯协议和接入方式 ,以及网络安全的防火墙技术。
关键词 internet/intranet 通信协议 安全 访问 网页 矿山企业
在线阅读 下载PDF
基于Internet/Intranet的电力企业门户 被引量:2
12
作者 董昕 王成文 +2 位作者 李国华 王洪波 蔡浩哲 《电力系统自动化》 EI CSCD 北大核心 2001年第21期21-24,共4页
提出了建立基于 Internet/Intranet的电力企业门户的设想 ,阐述了其建设目标和意义 ,并就电力企业门户的网络构架、基本内容进行了探讨 ,它以国家电力数据网络为硬件平台 ,以 ERP或数据仓库为软件平台 ,以电力企业的客户服务中心为接入... 提出了建立基于 Internet/Intranet的电力企业门户的设想 ,阐述了其建设目标和意义 ,并就电力企业门户的网络构架、基本内容进行了探讨 ,它以国家电力数据网络为硬件平台 ,以 ERP或数据仓库为软件平台 ,以电力企业的客户服务中心为接入点 ,内容包括电力企业生产、调度运行和管理 ,办公自动化 ,客户服务、投诉、报修业务 ,行业监督 ,以及信息发布、电子商务等增值服务。文中进一步分析了电力企业门户的建设步骤。 展开更多
关键词 电力系统 电力企业 电子商务 客户服务中心 信息网络 internet intranet 企业网络
在线阅读 下载PDF
QUALITY ASSURANCE INFORMATION SYSTEM FOR AGILE MANUFACTURING
13
作者 孙蓓蓓 钟秉林 +2 位作者 崔敏 黄仁 A kif A.Bulgak 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2000年第1期71-77,共7页
The customer driven dynamic global market and geographical distribution of collaborating partners bring new challenges to the development of quality assurance information system (QAIS) for agile manufacturing. With re... The customer driven dynamic global market and geographical distribution of collaborating partners bring new challenges to the development of quality assurance information system (QAIS) for agile manufacturing. With recent dramatic advances in information technology, firstly the requirements of QAIS are examined in agile manufacturing environment, then a new implementation framework of a distributed QAIS is presented, where a deve loping environment of QAIS is established and some critical techniques are studied. Finally a prototype system based on world wide web (WWW) is accomplished. 展开更多
关键词 QUALITY quality control information system quality assurance agile manufacturing internet intranet
在线阅读 下载PDF
基于Internet/Intranet的图书馆信息系统的实现 被引量:1
14
作者 李卫东 《图书馆学研究》 2002年第11期28-29,共2页
本文介绍了一个基于Internet/Intranet的图书馆信息系统的结构、功能和实现过程。
关键词 图书馆信息系统 实现 internet /intranet
在线阅读 下载PDF
基于Internet/Intranet的供应链管理信息系统研究 被引量:2
15
作者 别文群 《物流技术》 2005年第2期86-88,共3页
分析了供应链和供应链管理的基础,并针对一个MIS的模块结构实例,给出基于Internet/Intranet的供应链管理信息系统的一个例子。
关键词 供应链 Intemev/intranet管理信息系统
在线阅读 下载PDF
Internet/Intranet 信息安全系统的设计及实现
16
作者 邢育森 林晓东 杨义先 《高技术通讯》 EI CAS CSCD 1998年第3期16-19,共4页
介绍了Internet/Intranet信息安全系统的主要安全服务机制,分析了身份认证、数据加密、数字签名、信息认证的工作原理和安全性能,同时说明了该系统在Internet/In-tranet网络环境中的适用性和技术... 介绍了Internet/Intranet信息安全系统的主要安全服务机制,分析了身份认证、数据加密、数字签名、信息认证的工作原理和安全性能,同时说明了该系统在Internet/In-tranet网络环境中的适用性和技术特点。 展开更多
关键词 信息安全系统 internet intranet
在线阅读 下载PDF
基于Intranet/Internet的大坝安全监测信息查询系统 被引量:3
17
作者 陈振飞 邓昌铁 《水电自动化与大坝监测》 2002年第1期54-56,共3页
大坝安全监测信息的网上发布可以让人们了解各种实时、动态信息 ,文中主要介绍了在Intranet/Internet下采用 ASP( active serverpages)结合 VBScript,Java Script及 Active X技术进行大坝安全监测信息查询系统开发的方法及步骤 。
关键词 intranet internet 大坝 安全监测 信息查询系统
在线阅读 下载PDF
利用Internet/Intranet技术建立县级农副产品网络信息港
18
作者 冯利军 李书全 郑旌辉 《计算机工程》 EI CAS CSCD 北大核心 2000年第5期72-73,共2页
利用当今先进的Internet/Intranet技术建立正定县农副产品网络信息港,在网上发布农副产品的信息,利用这些信息指导企业和农民对农副产品的种植,养殖和加工,并可实现网上订购产品。
关键词 网络信息港 农副产品 internet intranet
在线阅读 下载PDF
基于INTRANET/INTERNET的街道综合信息系统研究与实现
19
作者 忻尚芝 桂海峰 陈世平 《计算机应用与软件》 CSCD 北大核心 2003年第7期44-45,76,共3页
论述了基于Intranet Internet信息系统的基本体系结构、Web开发技术、数据库访问技术和信息系统的网络安全 。
关键词 软件开发 intranet internet 街道综合信息系统 电子政府
在线阅读 下载PDF
基于Internet/Intranet的供应链管理信息系统 被引量:2
20
作者 姜艺 《武汉船舶职业技术学院学报》 2003年第4期40-44,共5页
在当今全球经济大环境下,供应链管理向基于Internet/Intranet的互联网供应链管理模式发展。本文分析了供应链和供应链管理的基础,并针对一个MIS的模块结构实例,给出基于Internet/Intranet的供应链MIS的网络结构和信息集成技术支撑体系。
关键词 供应链 internet/intranet 管理信息系统.
在线阅读 下载PDF
上一页 1 2 48 下一页 到第
使用帮助 返回顶部