This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i...This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements.展开更多
Against the backdrop of the global digital wave,human resource management(HRM)in innovation and entrepreneurship enterprises is undergoing profound transformation,with data emerging as a core asset driving corporate d...Against the backdrop of the global digital wave,human resource management(HRM)in innovation and entrepreneurship enterprises is undergoing profound transformation,with data emerging as a core asset driving corporate decision-making and development.However,issues related to data security and privacy protection have become increasingly prominent,serving as key factors restricting the sustainable development of enterprises.By analyzing the challenges faced by innovation and entrepreneurship enterprises in data security and privacy protection within HRM,this paper explores the importance of these issues and proposes countermeasures such as constructing a data security governance system,applying privacy computing technologies,and enhancing employees’data security awareness.The aim is to provide theoretical references and practical guidance on data security and privacy protection for innovation and entrepreneurship enterprises,helping them achieve a balance between security and development during digital transformation.展开更多
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem...Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks.展开更多
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak...Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy...The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy.展开更多
With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it ...With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it also poses significant cybersecurity challenges to the financial sector. This study comprehensively analyzes the current state, challenges, and protective measures of cybersecurity in the financial sector, aiming to provide important references for financial institutions in formulating cybersecurity strategies and enhancing risk management.展开更多
In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data te...In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data technology has significantly improved the decision-making efficiency,customer insight,and risk management capabilities of financial institutions.The financial industry has become a pioneer in the application of big data technology,which is widely used in scenarios such as fraud detection,risk management,customer service optimization,and smart transactions.However,financial data security management also faces many challenges,including data breaches,privacy protection,compliance requirements,the complexity of emerging technologies,and the balance between data access and security.This article explores the major challenges of financial data security management,coping strategies,and the evolution of the regulatory environment,and it looks ahead to future trends,highlighting the important role of artificial intelligence and machine learning in financial data security.展开更多
Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,t...Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.展开更多
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.展开更多
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ...Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.展开更多
The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses ...The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent.展开更多
The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier sharehol...The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market.展开更多
As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,tra...As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,transformed supply channels,tightening international situation and frequent emergencies)in recent years and has attracted extensive attention from the academic community subject to multiple factors.This study uses literature review,statistical analysis,and spatial analysis methods to systematically explore China’s food security situation in the context of farmland resource constraints.It is found that the demand-side pressures such as demographic changes,social class differentiation,and dietary structure adjustments derived from economic growth and rapid urbanization have placed extremely high expectations on food supply.However,the quantitative restrictions,utilization ways,and health risks of farmland resources on the supply side constitute a huge hidden concern that affects the stability of food production.Although China’s farmland protection system is undergoing a transition from focusing on quantity management to sustainable use,the matching and coordinating demand pressure and supply capacity for food security is unbalanced.Therefore,facing uncertain future development scenarios,policymakers should focus on building a resilient space for China’s farmland protection to withstand the interference of major emergencies.The existing farmland protection space policy can be integrated by establishing a national farmland strategic reserve system(based on resilient space),and further development of targeted use control measures for zoning,grading,and classification will help realize sustainable China’s farmland resources use.展开更多
Inspired by the natural corn structure,a Si@hollow graphene shell@graphene(Si@GS@G)anode material was prepared in which silicon nanoparticles were preliminarily anchored onto the surface of an elastic graphene shell a...Inspired by the natural corn structure,a Si@hollow graphene shell@graphene(Si@GS@G)anode material was prepared in which silicon nanoparticles were preliminarily anchored onto the surface of an elastic graphene shell and further constrained using graphene sheets.Hollow graphene oxide shells with abundant surficial hydrogen bonds,which were synthesized using a novel bottom-up method,were used as an intermediate material to anchor positively charged silicon nanoparticles via electrostatic attraction and achieve a rational spatial distribution.The inner hollow graphene shell anchorage and outer graphene constraint synergistically constituted a porous and robust conductive corn-like structure.The as-fabricated Si@GS@G anode afforded efficient electron and ion transport pathways and improved structural stability,thereby enhancing Li+storage capability(505 mAh·g^(−1)at 10 A·g^(−1))and extending the lifespan compared to the single hollow graphene shell or graphene sheet-protected Si anode(72%capacity retention after 500 cycles).The improved kinetics of the Si@GS@G anode were investigated using electro impedance spectroscopy,galvanostatic intermittent titration,and pseudocapacitance contribution rate analysis,and the structural evolution was analyzed using ex situ electron microscopy.This study proposes a novel hollow graphene oxide shell as an activated intermediate material for designing a porous electrode structure that facilitates an enhanced electrochemical performance.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationshi...Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems.展开更多
The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the stu...The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho...Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.展开更多
文摘This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements.
基金the horizontal research project of Guangzhou College of Technology and Business entitled College Students'Entrepreneurial Intention and Realization Path under the Background of Artificial Intelligence(Project No.:KYHX2025032).
文摘Against the backdrop of the global digital wave,human resource management(HRM)in innovation and entrepreneurship enterprises is undergoing profound transformation,with data emerging as a core asset driving corporate decision-making and development.However,issues related to data security and privacy protection have become increasingly prominent,serving as key factors restricting the sustainable development of enterprises.By analyzing the challenges faced by innovation and entrepreneurship enterprises in data security and privacy protection within HRM,this paper explores the importance of these issues and proposes countermeasures such as constructing a data security governance system,applying privacy computing technologies,and enhancing employees’data security awareness.The aim is to provide theoretical references and practical guidance on data security and privacy protection for innovation and entrepreneurship enterprises,helping them achieve a balance between security and development during digital transformation.
基金funded by Youth Program of Shaanxi Provincial Department of Science and Technology(Grant No.2024JC-YBQN-0630)。
文摘Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks.
文摘Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
文摘The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy.
文摘With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it also poses significant cybersecurity challenges to the financial sector. This study comprehensively analyzes the current state, challenges, and protective measures of cybersecurity in the financial sector, aiming to provide important references for financial institutions in formulating cybersecurity strategies and enhancing risk management.
基金Exploration and Practice of the Application of Blockchain Technology to the Cultivation of Compound Talents under the Background of Free Trade Port(HKJG2023-18)。
文摘In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data technology has significantly improved the decision-making efficiency,customer insight,and risk management capabilities of financial institutions.The financial industry has become a pioneer in the application of big data technology,which is widely used in scenarios such as fraud detection,risk management,customer service optimization,and smart transactions.However,financial data security management also faces many challenges,including data breaches,privacy protection,compliance requirements,the complexity of emerging technologies,and the balance between data access and security.This article explores the major challenges of financial data security management,coping strategies,and the evolution of the regulatory environment,and it looks ahead to future trends,highlighting the important role of artificial intelligence and machine learning in financial data security.
基金supported by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.
基金funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
文摘A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
基金supported by the Natural Science Foundation of China(No.U22A2099)the Innovation Project of Guangxi Graduate Education(YCBZ2023130).
文摘Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.
基金Project supported by the National Natural Science Foundation of China(Nos.62266030 and 61863025)。
文摘The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent.
文摘The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market.
基金National Social Science Fund of China,No.19ZDA096National Natural Science Foundation of China,No.41971234,No.41971235+1 种基金Postgraduate Research and Practice Innovation Project of Jiangsu Province,No.KYCX21_0039Open Fund of Key Laboratory of Coastal Zone Exploitation and Protection,Ministry of Natural Resources,No.2021CZEPK07。
文摘As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,transformed supply channels,tightening international situation and frequent emergencies)in recent years and has attracted extensive attention from the academic community subject to multiple factors.This study uses literature review,statistical analysis,and spatial analysis methods to systematically explore China’s food security situation in the context of farmland resource constraints.It is found that the demand-side pressures such as demographic changes,social class differentiation,and dietary structure adjustments derived from economic growth and rapid urbanization have placed extremely high expectations on food supply.However,the quantitative restrictions,utilization ways,and health risks of farmland resources on the supply side constitute a huge hidden concern that affects the stability of food production.Although China’s farmland protection system is undergoing a transition from focusing on quantity management to sustainable use,the matching and coordinating demand pressure and supply capacity for food security is unbalanced.Therefore,facing uncertain future development scenarios,policymakers should focus on building a resilient space for China’s farmland protection to withstand the interference of major emergencies.The existing farmland protection space policy can be integrated by establishing a national farmland strategic reserve system(based on resilient space),and further development of targeted use control measures for zoning,grading,and classification will help realize sustainable China’s farmland resources use.
基金the National Natural Science Foundation of China(Nos.52071225 and 51672181)the Czech Republic through ERDF“Institute of Environmental Technology-Excellent Research”(No.CZ.02.1.01/0.0/0.0/16_019/0000853)M.H.R.acknowledges the Sino-German Research Institute for their support(Project GZ 1400).
文摘Inspired by the natural corn structure,a Si@hollow graphene shell@graphene(Si@GS@G)anode material was prepared in which silicon nanoparticles were preliminarily anchored onto the surface of an elastic graphene shell and further constrained using graphene sheets.Hollow graphene oxide shells with abundant surficial hydrogen bonds,which were synthesized using a novel bottom-up method,were used as an intermediate material to anchor positively charged silicon nanoparticles via electrostatic attraction and achieve a rational spatial distribution.The inner hollow graphene shell anchorage and outer graphene constraint synergistically constituted a porous and robust conductive corn-like structure.The as-fabricated Si@GS@G anode afforded efficient electron and ion transport pathways and improved structural stability,thereby enhancing Li+storage capability(505 mAh·g^(−1)at 10 A·g^(−1))and extending the lifespan compared to the single hollow graphene shell or graphene sheet-protected Si anode(72%capacity retention after 500 cycles).The improved kinetics of the Si@GS@G anode were investigated using electro impedance spectroscopy,galvanostatic intermittent titration,and pseudocapacitance contribution rate analysis,and the structural evolution was analyzed using ex situ electron microscopy.This study proposes a novel hollow graphene oxide shell as an activated intermediate material for designing a porous electrode structure that facilitates an enhanced electrochemical performance.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
基金the research fruits of"A Study of the Public Interest Litigation and Security Mechanism for the Quality and Safety of Agricultural Products"(15BGL135),a general project granted by the National Social Sciences Planning Office.
文摘Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems.
文摘The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
文摘Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.