期刊文献+
共找到150,244篇文章
< 1 2 250 >
每页显示 20 50 100
国家安全情报研究核心著者群体画像与研究洞察——基于Intelligence and National Security期刊的分析
1
作者 胡雅萍 肖咏歌 《科技情报研究》 2026年第1期12-22,共11页
[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and Natio... [目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。 展开更多
关键词 履历分析 核心著者 情报研究 LDA主题挖掘 国家安全情报 群体画像
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
2
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
3
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDs smallholder farmers
在线阅读 下载PDF
Incorporating multiple scenarios and landscape ecological risk to optimize ecological security patterns: A Wei River Basin case study
4
作者 Xueting Wu Jinghu Pan 《Chinese Journal of Population,Resources and Environment》 2026年第1期94-109,共16页
Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in ... Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide. 展开更多
关键词 Ecological security pattern Multiple scenarios Landscape ecological risk Ecological security pattern optimization
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
5
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUs irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
6
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Addressing the Security Governance Deficit Amid Intensifying Global Turmoil:A 2025 Retrospective on International Security
7
作者 Tang Yongsheng 《Contemporary World》 2026年第1期8-15,共8页
In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.... In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging. 展开更多
关键词 international architecture regional conflicts applying discarding international rules global turmoil profound transformations latent risks security governance deficit international security
在线阅读 下载PDF
Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR
8
作者 Shu-Yin Chiang Shin-En Huang 《Computers, Materials & Continua》 2026年第4期1735-1753,共19页
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta... This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments. 展开更多
关键词 RGB-D semantic mapping object recognition obstacle avoidance security robot
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
9
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI%PLUs%sAst secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
International food trade increased the food security gap between high and low economic development groups
10
作者 Zihan Xu Tianyi Wu +2 位作者 Tao Hu Yanxu Liu Jian Peng 《Geography and Sustainability》 2026年第1期119-131,共13页
International trade serves as a crucial pathway for enhancing global food security and equality amid severe food crises worldwide.Under globalization,economic development has profoundly influenced food trade,while dis... International trade serves as a crucial pathway for enhancing global food security and equality amid severe food crises worldwide.Under globalization,economic development has profoundly influenced food trade,while disparities in food purchasing power among different economic development groups have led to uneven food security outcomes.However,the varying contributions of international trade to food security across these groups remain to be quantitatively elucidated.This study categorized countries into four economic development groups—high,high-medium,medium-low,and low—and examined changes in their food security scores from 2010 to 2019.The cross-group contributions of international trade to food security across these groups were compared.The results revealed that the food security score of the high economic development group was 9.22 times higher than that of the low economic development group.From 2010 to 2019,the high economic development group exhibited a significant upward trend in food security scores,whereas the low economic development group showed a significant decline.Moreover,international trade contributed significantly to both cross-group and within-group food security in the high economic development group,while its contribution to the low economic development group remained negligible.These findings demonstrated that international trade has further widened the food security gap between the high and low economic development groups,and its limited contribution to the low economic development group has failed to reverse the declining trend in their food security scores.This study quantified the divergent impacts of international trade on food security across economic development groups,providing valuable insights for optimizing global food trade policies—particularly in addressing the food security challenges faced by low econominc development group. 展开更多
关键词 Food supply and demand Food security International trade Economic development group Cross-regional
在线阅读 下载PDF
Physical Layer Security for Satellite Optical Communication under Angle-of-Arrival Fluctuations
11
作者 He Jinyu Xu Guanjun +1 位作者 Song Zhaohui Zhang Qinyu 《China Communications》 2026年第2期150-161,共12页
In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow t... In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems. 展开更多
关键词 angle-of-arrival fluctuations M´alaga distribution non-zero boresight pointing errors physical layer security satellite optical communication
在线阅读 下载PDF
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
12
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of things(Iot) HCI CNN LstM random forest intelligent secure solutions
在线阅读 下载PDF
The Philosophical Matrix as a Language of Intercultural and Interreligious Dialogue:Reflections on the UN Security Council Session of March 2,2026
13
作者 Yuriy Rotenfeld 《Philosophy Study》 2026年第2期126-133,共8页
The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it ana... The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it analyzes a paradox:all participants speak about the same values but do not hear one another.As a solution,the Philosophical Matrix is proposed-a system of maximally general comparative concepts(the identical,the different,the correlative,the opposite,the orthogonal)that explicates a universal language of thinking,which the author calls the“language of Elohim”.The cultural-historical roots of this language are traced in the first chapter of Genesis,in Heraclitus,in Laozi,and in the Sefer Yetzirah.An analysis of the March 2 speeches allows us to diagnose at which levels of thinking(reason,practical mind,pure mind,wisdom)today’s educators and politicians operate.The conclusion proposes the“Wise School”project as a practical path for returning to the“language of Elohim”through education starting from early childhood. 展开更多
关键词 Philosophical Matrix language of Elohim comparative concepts trilogy of Mind UN security Council Melania trump “Wise school” dialogue of cultures transdisciplinarity
在线阅读 下载PDF
基于TOPSIS法的河南省土地生态安全时空演变特征分析
14
作者 鲁春阳 张传系 +1 位作者 路晓明 文枫 《河南城建学院学报》 2026年第1期61-71,共11页
开展土地生态安全测度是科学研判区域土地生态安全状况、明确土地资源可持续利用路径的重要前提与基础。基于压力、状态与响应3个维度构建河南省土地生态安全评价指标体系,运用TOPSIS方法对2013—2023年河南省土地生态安全水平进行测度... 开展土地生态安全测度是科学研判区域土地生态安全状况、明确土地资源可持续利用路径的重要前提与基础。基于压力、状态与响应3个维度构建河南省土地生态安全评价指标体系,运用TOPSIS方法对2013—2023年河南省土地生态安全水平进行测度。结果表明,研究期间河南省土地生态安全水平整体呈波动缓升趋势,各城市土地生态安全水平介于危险级与亚安全级之间,整体处于中等偏低水平。2013—2018年河南省各地市土地生态系统的压力、状态与响应水平均呈缓慢上升趋势,但2023年出现下降,反映出土地生态安全稳定性较差。在空间分布格局上,河南省土地生态安全水平呈现“东南高、西北低”的梯度分布特征,豫东和豫南地区达到亚安全等级的城市数量近年来持续增多。为进一步提升土地生态安全水平,河南省应重点从制定生态安全总体规划、构建生态安全风险预警与监测平台、建立健全区域协同发展机制等方面系统推进。 展开更多
关键词 土地生态安全 tOPsIs 测度 河南省
在线阅读 下载PDF
SEC-EGAT:融合多尺度时序特征与边感知的网络安全异常检测方法
15
作者 张晓蓉 李浩 陈呈 《西南科技大学学报》 2026年第1期95-102,共8页
针对现有基于注意力机制的网络安全异常检测方法在处理复杂网络环境和多变攻击手段时的局限性,提出了一种改进的图注意力神经网络模型SEC-EGAT(Security-enhanced Graph Attention Network)。该模型通过引入基于多尺度时间窗口的特征提... 针对现有基于注意力机制的网络安全异常检测方法在处理复杂网络环境和多变攻击手段时的局限性,提出了一种改进的图注意力神经网络模型SEC-EGAT(Security-enhanced Graph Attention Network)。该模型通过引入基于多尺度时间窗口的特征提取捕捉网络时序动态,并设计边感知的图注意力机制结合图卷积网络来增强对节点间复杂交互的理解,旨在提高检测精度和识别复杂攻击模式的能力,在广泛使用的CICIDS 2017和UNSW-NB15网络攻击数据集上进行了实验验证。结果显示:在CICIDS 2017数据集上SEC-EGAT实现了97.2%的准确率和97.5%的召回率,在UNSW-NB15数据集上准确率为95.8%、召回率为96.3%;与LSTM-VAE,GDN,GCN等先进的图神经网络模型相比,SEC-EGAT在准确率、召回率和F 1分数上均表现出优势。SEC-EGAT模型能在复杂网络环境下提高网络异常检测精度。 展开更多
关键词 图注意力机制 网络安全 异常检测 图神经网络
在线阅读 下载PDF
前后端分离环境下Spring Security权限系统构建与实现
16
作者 何立富 《电脑编程技巧与维护》 2025年第10期3-7,共5页
通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器... 通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器及自定义表达式逻辑权限控制等规划,有效提升了系统的性能、安全性与灵活性。基于角色的访问控制权限(RBAC)的功能设计,借助可视化配置界面进一步增强了系统的易操作性。经测试验证,该系统具备高度的稳定性与有效性,能够精准地控制访问权限,为相关应用系统的权限管理提供了切实可靠的解决方案。 展开更多
关键词 spring security工具 前后端分离架构 动态化权限管理 JWt标准 基于角色的访问控制权限
在线阅读 下载PDF
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
17
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 北大核心 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
LSTM在恶意代码检测中的应用研究综述
18
作者 门嘉平 王高源 +2 位作者 陈张萌 张小平 周晓军 《信息安全研究》 北大核心 2026年第1期89-96,共8页
随着黑客技术的不断演进,恶意代码变种迭代升级加速,恶意代码数量爆炸性增长.如何快速准确地对恶意代码进行检测是网络安全领域具有挑战性的研究热点.长短期记忆网络(long short-term memory network,LSTM)独有的门控机制,能够有选择性... 随着黑客技术的不断演进,恶意代码变种迭代升级加速,恶意代码数量爆炸性增长.如何快速准确地对恶意代码进行检测是网络安全领域具有挑战性的研究热点.长短期记忆网络(long short-term memory network,LSTM)独有的门控机制,能够有选择性地保留重要的历史信息,同时对于数据在时间序列上的前后依赖关系具有良好性能,能够有效解决传统循环神经网络(recurrent neural network,RNN)在处理此类问题时可能产生的梯度消失或梯度爆炸困扰.LSTM这种独特时序处理能力对于恶意软件检测尤为重要,因此LSTM在恶意软件检测中得到了广泛的应用.从恶意代码的检测方法、LSTM的基本模型及变种、LSTM在恶意代码检测中的应用、LSTM在恶意代码检测中的性能分析、LSTM在恶意代码检测领域未来发展方向5个方面,对LSTM在恶意代码检测中的应用情况进行了全方位的整理和归纳,以期为恶意代码检测现有方法的进一步研究和改进提供帮助. 展开更多
关键词 长短期记忆网络 恶意代码检测 代码安全 网络空间安全 信息安全
在线阅读 下载PDF
D-ADETCS下遭受多源隐蔽型FDI攻击的ICPS多模态综合安全控制
19
作者 李亚洁 何源奎 李炜 《控制与决策》 北大核心 2026年第2期405-420,共16页
在分布式自适应离散事件触发通信机制(D-ADETCS)下,针对一类同时遭受多源隐蔽型虚假数据注入(FDI)攻击与执行器故障的工业信息物理系统(ICPS),从“攻”与“防”的不同视角,研究ICPS多模态综合安全控制与通信网络间的协同设计问题.首先,... 在分布式自适应离散事件触发通信机制(D-ADETCS)下,针对一类同时遭受多源隐蔽型虚假数据注入(FDI)攻击与执行器故障的工业信息物理系统(ICPS),从“攻”与“防”的不同视角,研究ICPS多模态综合安全控制与通信网络间的协同设计问题.首先,通过分析事件触发阈值变化率与系统运行状态间的关联特性,设计新型自适应离散事件触发阈值函数,并在系统双侧网络前端部署ADETCS构建D-ADETCS驱动下的综合安全控制架构;其次,考虑FDI攻击的隐蔽性、有效性和目标选择性等特征,建立支持多网络节点协同的多源隐蔽型FDI攻击模型,并基于大蔗鼠算法优化的轻量级梯度提升机设计分布式数据修复器,用于应对多源隐蔽型FDI攻击;再次,基于Lyapunov-Krasovskii泛函等方法,完成鲁棒观测器与多模态综合安全控制器的推证,进而基于密度峰值快速聚类算法完成控制模态的划分,并通过模糊控制策略实现各控制模态间的柔性切换;最后,通过仿真实验表明,所提方法与现有方法相比,在综合安全控制、优化通信资源配置等方面均具有显著优势. 展开更多
关键词 工业信息物理系统 多源隐蔽型FDI攻击 分布式自适应离散事件触发通信机制 数模联动 模糊控制 多模态综合安全控制
原文传递
EARAS:An Efficient,Anonymous,and Robust Authentication Scheme for Smart Homes
20
作者 Muntaham Inaam Hashmi Muhammad Ayaz Khan +3 位作者 Khwaja Mansoor ul Hassan Suliman A.Alsuhibany Ainur Abduvalova Asfandyar Khan 《Computers, Materials & Continua》 2026年第3期780-797,共18页
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ... Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy. 展开更多
关键词 smart home user authentication gateway node security Iot security privacy and security
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部