期刊文献+
共找到567篇文章
< 1 2 29 >
每页显示 20 50 100
Regarding the Regulatory Sandbox Route and Mechanism for Governance of Artificial Intelligence 被引量:3
1
作者 Ye Xuanhan 《科技与法律(中英文)》 CSSCI 2024年第5期136-148,共13页
The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was... The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication. 展开更多
关键词 artificial intelligence governance regulatory sandbox agile regulation inclusive prudential regulation access and exit mechanism coordination mechanism
在线阅读 下载PDF
Sandbox法求沥青混合料空隙分形维数 被引量:1
2
作者 于江 张帆 《公路工程》 北大核心 2015年第1期68-71,132,共5页
将沥青混合料横向剖切面图像用Matlab软件处理,分割出空隙的二值化图像并计算空隙分维数。在求沥青混合料空隙分维数时大多采用计盒维数法,然而此方法在网格划分的过程中对图像的尺寸有严格要求,并且背景区域对沥青混合料横向剖切面图... 将沥青混合料横向剖切面图像用Matlab软件处理,分割出空隙的二值化图像并计算空隙分维数。在求沥青混合料空隙分维数时大多采用计盒维数法,然而此方法在网格划分的过程中对图像的尺寸有严格要求,并且背景区域对沥青混合料横向剖切面图像的计算结果有一定的影响。为此提出采用Sandbox法求空隙分维数,不用考虑网格划分及背景区域对分维数的影响,且能真实的表达出沥青混合料横向剖切面空隙分维数的实际意义。通过Matlab编程运算,用Sandbox法求沥青混合料横向剖切面的空隙分维数为1.146,其结果符合多数文献中给出的范围,其求解过程更加简单方便,值得研究和推广运用。 展开更多
关键词 公路工程 空隙分形维数 sandbox 沥青混合料图像 计盒维数法
在线阅读 下载PDF
Sandbox modeling of fault formation and evolution in the Weixinan Sag, Beibuwan Basin, China 被引量:9
3
作者 Tong Hengmao 《Petroleum Science》 SCIE CAS CSCD 2012年第2期121-128,共8页
Fault formation and evolution in the presence of multiple pre-existing weaknesses has not been investigated extensively in rift basins. The fault systems of Weixinan Sag, Beibuwan Basin of China, which is fully covere... Fault formation and evolution in the presence of multiple pre-existing weaknesses has not been investigated extensively in rift basins. The fault systems of Weixinan Sag, Beibuwan Basin of China, which is fully covered with high-precision 3-D seismic data and is rich in oil-gas resources, have been successfully reproduced by sandbox modeling in this study with inclusion of multiple pre-existing weaknesses in the experimental model. The basic characteristics of fault formation and evolution revealed by sandbox modeling are as follows. 1) Weakness-reactivation faults and weakness-related faults are formed much earlier than the distant-weakness faults (faults far away from and with little or no relationship to the weakness). 2) Weakness-reactivation faults and weakness-related faults develop mainly along or parallel to a pre-existing weakness, while distant-weakness faults develop nearly perpendicular to the extension direction. A complicated fault system can be formed in a fixed direction of extension with the existence of multiple pre-existing weaknesses, and the complicated fault system in the Weixinan Sag formed gradually in a nearly N-S direction with multiple pre-existing weaknesses. 3) The increase in the length and number of faults is closely tied to the nature of pre-existing weaknesses. The sandbox model may provide a new clue to detailed fault system research for oil and gas exploration in rift basins. 展开更多
关键词 Fault system rift basin multiple pre-existing weaknesses Weixinan Sag sandbox modeling
原文传递
Sandbox Modeling of the Fault-increment Pattern in Extensional Basins 被引量:6
4
作者 Geng Changbo Tong Hengmao +1 位作者 He Yudan Wei Chunguang 《Petroleum Science》 SCIE CAS CSCD 2007年第2期29-34,共6页
Three series of sandbox modeling experiments were performed to study the fault-increment pattern in extensional basins. Experimental results showed that the tectonic action mode of boundaries and the shape of major bo... Three series of sandbox modeling experiments were performed to study the fault-increment pattern in extensional basins. Experimental results showed that the tectonic action mode of boundaries and the shape of major boundary faults control the formation and evolution of faults in extensional basins. In the process of extensional deformation, the increase in the number and length of faults was episodic, and every 'episode' experienced three periods, strain-accumulation period, quick fault-increment period and strain-adjustment period. The more complex the shape of the boundary fault, the higher the strain increment each 'episode' experienced. Different extensional modes resulted in different fault-increment patterns. The horizontal detachment extensional mode has the 'linear' style of fault-increment pattern, while the extensional mode controlled by a listric fault has the 'stepwise' style of fault-increment pattern, and the extensional mode controlled by a ramp-flat boundary fault has the 'stepwise-linear' style of fault-increment pattern. These fault-increment patterns given above could provide a theoretical method of fault interpretation and fracture prediction in extensional basins. 展开更多
关键词 Extensional basin sandbox modeling fault-increment pattern boundary fault
原文传递
Universe Sandbox^2软件在地理教学中的应用探究 被引量:1
5
作者 宋少威 《地理教学》 2021年第2期42-44,共3页
Universe Sandbox^2软件可以提供各种天体的质量、天体年龄、表面温度、自转周期等各类实时运转详细数据,它的最大的特点是可以自行修改初始参数或者自定义创造天体系统。Universe Sandbox^2软件不仅是一款可以模拟近似真实宇宙环境的软... Universe Sandbox^2软件可以提供各种天体的质量、天体年龄、表面温度、自转周期等各类实时运转详细数据,它的最大的特点是可以自行修改初始参数或者自定义创造天体系统。Universe Sandbox^2软件不仅是一款可以模拟近似真实宇宙环境的软件,而且还是一款可以帮助学生建立时空观、有效突破教学难点的软件。因此,它为师生教学提供了一个了解天体、了解宇宙的良好平台。 展开更多
关键词 Universe sandbox2 地理教学 应用实例
在线阅读 下载PDF
基于AR Sandbox的中学地理可视化教学及应用示范 被引量:2
6
作者 王夏青 周芳 +3 位作者 米元 邹小燕 喻伟建 王海珍 《中国教育技术装备》 2019年第21期32-34,37,共4页
AR Sandbox有助于学生对地理环境的手动实践操作和实时监控,是实现可视化教学的理想平台。介绍AR Sandbox平台基本原理及应用优势,并以中学地理"等高线地形图的判读"章节的教学案例作为应用示范,希望能为今后AR Sandbox在国... AR Sandbox有助于学生对地理环境的手动实践操作和实时监控,是实现可视化教学的理想平台。介绍AR Sandbox平台基本原理及应用优势,并以中学地理"等高线地形图的判读"章节的教学案例作为应用示范,希望能为今后AR Sandbox在国内中学地理教学中的应用提供理论依据和科学参考。 展开更多
关键词 AR sandbox 3D模型 可视化教学 中学地理 等高线
在线阅读 下载PDF
Sandbox Experi mental Study on the Influence of Rock Strength and Gravity on Formation of Thrusts
7
作者 魏春光 周建勋 何雨丹 《Journal of China University of Geosciences》 SCIE CSCD 2006年第1期43-48,共6页
A sandbox experiment model was designed to simulate how differences in rock strength and gravity between two blocks can influence the formation characteristics of thrusts. In the experiment the compression was from on... A sandbox experiment model was designed to simulate how differences in rock strength and gravity between two blocks can influence the formation characteristics of thrusts. In the experiment the compression was from one direction with basement shortening and the initial surfaces of the model were oblique. The results show that if the initial surface was horizontal or the slope angle was smaller than 7°, the compression induced two groups of thrusts with opposite dip orientations. If the slope angle of the initial surface was greater than 7°, the compression induced only one group of thrusts with a dip orientation contrary to the original compression direction. This result is similar to the actual section of a collision zone between two continental blocks. By applying stress analysis, rock strength is shown to be an important factor in deformation. As other boundary conditions are changeless, it is the change of gravitational potential energy that leads to different deformation styles. 展开更多
关键词 sandbox experiment STRENGTH surface slope THRUSTS energy GRAVITY
在线阅读 下载PDF
A User-friendly Model for Ransomware Analysis Using Sandboxing
8
作者 Akhtar Kamal Morched Derbali +5 位作者 Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第6期3833-3846,共14页
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including... Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including WannaCry,Petya,and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world.The analysis of ransomware is often carried out via sandbox environments;however,the initial setup and configuration of such environments is a challenging task.Also,it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis tools.In this research work,we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware attacks.Also,we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer user.Our model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized reports.In addition,for evaluating the usability and accessibility of our proposed model,we conduct a comprehensive user survey consisting of participants from various fields,e.g.,professional developers from software houses,people from academia(professors,students).Our evaluation results demonstrate a positive feedback of approximately 92%on the usability of our proposed model. 展开更多
关键词 Ransomware sandbox user-friendly model SURVEY
在线阅读 下载PDF
Regulatory sandbox expansion:Exploring the leap from fintech to medical artificial intelligence
9
作者 Yingpeng Qiu Han Yao +2 位作者 Ping Ren Xueqing Tian Mao You 《Intelligent Oncology》 2025年第2期120-127,共8页
This paper explores the expansion from fintech-based regulatory sandboxes to those that include medical artificial intelligence(AI)by examining their potential to foster innovation and accelerate market access while e... This paper explores the expansion from fintech-based regulatory sandboxes to those that include medical artificial intelligence(AI)by examining their potential to foster innovation and accelerate market access while ensuring safety and compliance,especially considering how they provide a flexible framework for medical AI companies to develop and test new technologies.This work also highlights the key risks involved,including data privacy,ethical concerns,real-world validation,and regulatory consistency,and proposes strategies for mitigation.Using case studies from the United States,the United Kingdom,the European Union,Indonesia,Japan,and China,this paper illustrates how regulatory sandboxes can support AI-driven healthcare innovation.Overall,although regulatory sandboxes present several risks,they are valuable for advancing medical AI,granted that they balance innovation with robust oversight to ensure patient safety and long-term benefits. 展开更多
关键词 Regulatory sandbox Artificial intelligence Medical AI Public health Innovation regulation
在线阅读 下载PDF
Transport of graphene oxide in the capillary fringe:Insights from sandbox experiments and numerical simulation
10
作者 Taotao Lu Feiyu Chen +3 位作者 Xiaochen Liu Xue Bai Hao Peng Shuangcheng Tang 《Emerging Contaminants》 CSCD 2024年第3期103-110,共8页
Studying contaminant transport in the capillary fringe(CF),a crucial part of the vadose zone,offers insights into the mechanisms controlling pollution in soils and groundwater aquifers.This paper investigated contamin... Studying contaminant transport in the capillary fringe(CF),a crucial part of the vadose zone,offers insights into the mechanisms controlling pollution in soils and groundwater aquifers.This paper investigated contaminant transport in the CF by continuously injecting a conservative tracer(NaCl)and graphene oxide nanoparticle(GONP),an adsorptive contaminant,into a sandbox.After entering the CF from the unsaturated zone,both NaCl and GONP underwent lateral transport.The breakthrough curves(BTCs)for NaCl and GONP were derived from water samples collected at predetermined sampling holes.Subsequently,contaminant transport in the CF was modeled using a one-dimensionaletwo-dimensional(1D-2D)coupled hydrodynamic model.This model incorporated lateral dispersivity(aL=1.198 cm)and longitudinal dispersivity(aT=0.286 cm),calculated using a point-by-point method.The hydrodynamic dispersion coefficients obtained were then applied to the Brooks and Corey(BC)and the van Genuchten(VG)parametric models.The BC model more accurately simulated the NaCl migration compared to the VG model,leading to its application in simulating GONP transport in the CF.However,the simulated BTCs for GONP showed a lag behind the measured data,especially at high ionic strengths.This discrepancy was attributed to the variable adsorption partition coefficient of GONP under different ionic conditions.During the experiment,GONP adsorption onto the porous media's surface altered the capillary dynamics,notably increasing capillary rise height,decreasing seepage velocity,and reducing GONP dispersion.Therefore,it is necessary to consider the adsorption capacity of the contaminants in order to accurately assess their transport within the vadose zone. 展开更多
关键词 Capillary fringe TRANSPORT sandbox experiment Numerical simulation
原文传递
Universe Sandbox软件在地理教学评价中的应用研究
11
作者 谢永翔 岳金成 阳伟娟 《进展》 2024年第20期79-81,共3页
地理教学评价在培养学生地理思维和地理素养的过程中起着不可或缺的作用,但传统的地理教学评价存在教学实施方式创新不足、教学资源整合开发不当、学生学习过程缺乏自主性以及教学评价机制略显功利化等问题。而基于评价主体多元化、评... 地理教学评价在培养学生地理思维和地理素养的过程中起着不可或缺的作用,但传统的地理教学评价存在教学实施方式创新不足、教学资源整合开发不当、学生学习过程缺乏自主性以及教学评价机制略显功利化等问题。而基于评价主体多元化、评价内容全面化、评价过程全程化原则的Universe Sandbox软件应用于地理教学评价有利于解决上述问题。其中地球系统的模拟与探索、星球和行星关系模拟、动量守恒模拟等课例实践证明该评价方式够帮助学生实现知识水平的提高,完善地理学科的综合能力,提升学习效果。 展开更多
关键词 Universe sandbox 地理 教学评价
在线阅读 下载PDF
软弱膏盐层系滑脱构造变形特征:以库车前陆盆地砂箱物理模拟为例 被引量:1
12
作者 莫涛 郭虹兵 +3 位作者 刘恣君 潘杨勇 范坤宇 邓宾 《大地构造与成矿学》 北大核心 2025年第3期507-519,共13页
褶皱冲断带‒前陆盆地系统普遍受控于软弱岩层滑脱层构造变形和差异剥蚀作用,从而导致褶皱冲断带系统构造解释多样性和油气勘探的复杂性。本文基于库车前陆盆地系统,针对不同厚度膏岩滑脱层系构造变形作用,通过沿走向变化的构造剥蚀‒沉... 褶皱冲断带‒前陆盆地系统普遍受控于软弱岩层滑脱层构造变形和差异剥蚀作用,从而导致褶皱冲断带系统构造解释多样性和油气勘探的复杂性。本文基于库车前陆盆地系统,针对不同厚度膏岩滑脱层系构造变形作用,通过沿走向变化的构造剥蚀‒沉积作用砂箱物理模拟实验和野外地质调查等研究,揭示沿走向变化的剥蚀‒沉积作用导致软弱膏岩层系滑脱构造变形差异特征。滑脱层变形导致深‒浅部地层变形特征具有差异性,深部层系受挤压缩短基底卷入变形发育逆冲叠瓦断层及其双重构造变形特征,浅部层系沿硅胶滑脱层顺层逆冲滑脱,形成冲起构造。受控多期冲断变形作用中-厚层硅胶砂箱模型滑脱层变形过程具明显的沿前陆盆地向断层断距减小的特征。塔里木盆地北缘库车前陆坳陷发育厚层新生代膏盐岩,控制形成一系列复杂的盐相关构造和主断层带,软弱盐层对其上覆层系和下伏基底差异性调节作用,导致区域构造带深浅部脱耦作用显著。同构造沉积地层可能抑制膏岩滑脱多期次冲断变形作用,导致盐上层系滑脱变形相对较弱。 展开更多
关键词 砂箱物理模拟 膏盐滑脱层 构造‒沉积耦合 褶皱冲断带 塔里木盆地北缘
在线阅读 下载PDF
加强人工智能监管与治理 被引量:4
13
作者 郭朝先 《北京工业大学学报(社会科学版)》 北大核心 2025年第3期19-25,共7页
鉴于人工智能发展存在巨大的不确定性,如果不能适当监管和治理,人类社会很可能出现一个“反乌托邦未来”,良好监管和治理是人工智能健康发展的必要保障机制。当前,人类正进入一个巨大的不确定时代,人工智能发展已到了“奥本海默时刻”,... 鉴于人工智能发展存在巨大的不确定性,如果不能适当监管和治理,人类社会很可能出现一个“反乌托邦未来”,良好监管和治理是人工智能健康发展的必要保障机制。当前,人类正进入一个巨大的不确定时代,人工智能发展已到了“奥本海默时刻”,加强人工智能监管治理刻不容缓。人工智能监管治理目标是要实现发展与安全、监管治理与国际竞争的平衡,中国人工智能监管治理既要促进国内人工智能产业安全发展,还要有利于抢占全球人工智能监管治理规则制高点。为有效实现监管目标,中国人工智能监管应坚持“以人为本,智能向善”、推进包容审慎监管、加强监管治理国际合作等基本理念。加强人工智能监管治理需结合人工智能技术发展特点,及时更新监管制度,创新监管方式,主要措施有:推进基于风险的监管方式,实行敏捷监管,推进“软法”与“硬法”协同监管,采用“沙盒监管”,建立“吹哨人”制度。 展开更多
关键词 人工智能 奥本海默时刻 智能向善 敏捷监管 沙盒监管
在线阅读 下载PDF
人脸识别的治理困境与规制改进
14
作者 吴旭莉 《厦门大学学报(哲学社会科学版)》 北大核心 2025年第4期103-114,共12页
人脸识别技术具有人脸信息收集渠道隐蔽且多样、技术安全漏洞、人脸信息的唯一性与不可逆性等技术风险。人脸识别技术治理的法律困境包括知情—同意原则被虚化,人脸信息保护的权利基础存在争议,技术滥用侵害个人权益,主体维权意识薄弱... 人脸识别技术具有人脸信息收集渠道隐蔽且多样、技术安全漏洞、人脸信息的唯一性与不可逆性等技术风险。人脸识别技术治理的法律困境包括知情—同意原则被虚化,人脸信息保护的权利基础存在争议,技术滥用侵害个人权益,主体维权意识薄弱、侵权救济困难等问题。人脸识别保护的权利跨越公法权利与私权领域,对其治理应当打破部门法的界限,寻求人脸识别技术的开发、利用与主体权利保护之间的平衡。优化人脸识别技术的规制,应秉持“以人为本”的治理理念,强化人脸信息控制者的信义义务,落实比例原则,坚持最小限度的适用,引入监管沙盒,改进维权模式,探索具有中国特色的人脸识别治理路径。 展开更多
关键词 人脸识别 私密信息 基本权利 隐私权 信义义务 比例原则 监管沙盒
在线阅读 下载PDF
基于多层防御的医院科研数据平台安全设计与实践
15
作者 王坤 彭建明 《中国数字医学》 2025年第7期14-18,共5页
本文基于零信任安全模型,针对医院科研数据平台的安全需求,提出并设计了一套多层防御架构。该架构通过堡垒机实现安全接入控制,结合安全沙箱技术保障数据隔离访问,并依托分布式防火墙与动态权限管理机制,确保域用户在远程登录过程中的... 本文基于零信任安全模型,针对医院科研数据平台的安全需求,提出并设计了一套多层防御架构。该架构通过堡垒机实现安全接入控制,结合安全沙箱技术保障数据隔离访问,并依托分布式防火墙与动态权限管理机制,确保域用户在远程登录过程中的数据安全。同时,采用域控集中化管理策略和上网行为审计措施,有效降低了敏感数据泄露风险。研究表明,该方案显著提升了医院科研数据平台的安全防护能力和合规管理水平,为医疗行业数字化建设提供了可落地的安全实践参考。 展开更多
关键词 零信任模型 医院科研数据 数据安全 堡垒机 安全沙箱 动态权限管理
暂未订购
基于“岗课赛证”融通的《跨境电子商务沙盘运营实训》新型活页式教材开发研究
16
作者 刘燕 吴华美 《湖北开放职业学院学报》 2025年第8期191-192,195,共3页
随着职业教育改革的推进,为了更好地激发学生的学习兴趣和主动性,培养学生的综合职业能力,新型活页式教材应运而生。对照跨境电子商务运营岗位要求,以国赛、省赛B2C模块为契机,对接跨境电商B2C数据运营职业技能等级标准,《跨境电子商务... 随着职业教育改革的推进,为了更好地激发学生的学习兴趣和主动性,培养学生的综合职业能力,新型活页式教材应运而生。对照跨境电子商务运营岗位要求,以国赛、省赛B2C模块为契机,对接跨境电商B2C数据运营职业技能等级标准,《跨境电子商务沙盘运营实训》新型活页式教材注重以学生为中心,从教材体系、教材内容、评价体系三个维度探讨基于“岗课赛证”融通的活页式教材开发思路与设计过程,以期推动教学改革、提升教学质量、培养高素质技术技能型人才。 展开更多
关键词 岗课赛证 跨境电子商务 融通 沙盘运营 新型活页式教材
在线阅读 下载PDF
大型医院临床科研可信数据空间的技术路径研究 被引量:3
17
作者 孙润康 李金 +2 位作者 任宇飞 陈妍妍 汪火明 《中国医院管理》 北大核心 2025年第4期70-72,共3页
为了提升临床科研数据管理的可信性、安全性和便捷性,推动临床科研数据的深度利用,通过引入数据沙箱技术、零信任架构、云计算弹性资源调度及数据湖等核心技术,构建了一个具备可信管控、资源交互、价值共创能力的临床科研可信数据空间... 为了提升临床科研数据管理的可信性、安全性和便捷性,推动临床科研数据的深度利用,通过引入数据沙箱技术、零信任架构、云计算弹性资源调度及数据湖等核心技术,构建了一个具备可信管控、资源交互、价值共创能力的临床科研可信数据空间。临床科研可信数据空间通过严格的网络访问控制、动态认证、数据脱敏与数字水印技术,为科研人员提供了安全高效的数据处理与分析平台,保障了科研数据全生命周期的安全流转与精准追溯,实现了资源交互与价值共创,为公立医院构建可信科研数据平台提供了技术参考和实践借鉴。 展开更多
关键词 医院 临床科研 可信数据空间 数据沙箱 零信任
暂未订购
感知价值导向的营销沙盘教学效果提升研究
18
作者 王影 《北华大学学报(社会科学版)》 2025年第3期120-130,155,156,共13页
近年来,随着人工智能技术的飞速发展、科技产品的快速更迭和企业人才需求的急剧变化,高校营销沙盘教学亟待优化创新,以提升教学实效。以学生感知价值为切入点,综合运用定性与定量研究方法,通过访谈与问卷调查剖析影响教学效果的因素。... 近年来,随着人工智能技术的飞速发展、科技产品的快速更迭和企业人才需求的急剧变化,高校营销沙盘教学亟待优化创新,以提升教学实效。以学生感知价值为切入点,综合运用定性与定量研究方法,通过访谈与问卷调查剖析影响教学效果的因素。结果表明,市场感知敏锐度、综合营销能力整合度及管理创新思维活跃度三个维度均与学生对营销沙盘课堂的感知价值呈正相关,是提升教学效果的关键路径。基于此,提出了营销沙盘教学效果提升的对策与建议,营销沙盘教学效果的提升能有效缩小理论教学与实践应用之间的差距,有助于提高在复杂市场环境中的决策科学性与团队协作效率,为数智化营销实践教学改革提供理论支撑与实践范式。 展开更多
关键词 营销沙盘模拟 感知价值 数智化营销 学生视角
在线阅读 下载PDF
Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework
19
作者 Jong-Yih Kuo Ping-Feng Wang +1 位作者 Ti-Feng Hsieh Cheng-Hsuan Kuo 《Computer Modeling in Engineering & Sciences》 2025年第6期3133-3166,共34页
In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularl... In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularly as Linux platforms—historically overlooked in favor of Windows—have emerged as frequent targets.According to Trend Micro,there has been a substantial increase in Linux-targeted malware,with ransomware attacks on Linux surpassing those on macOS.This alarming trend underscores the need for detection strategies specifically designed for Linux environments.To address this challenge,this study proposes a comprehensive malware detection framework tailored for Linux systems,integrating dynamic behavioral analysis with the semantic reasoning capabilities of large language models(LLMs).Malware samples are executed within sandbox environments to extract behavioral features such as system calls and command-line executions.These features are then systematically mapped to the MITRE ATT&CK framework,incorporating its defined data sources,data components,and Tactics,Techniques,and Procedures(TTPs).Two mapping constructs—Conceptual Definition Mapping and TTP Technical Keyword Mapping—are developed from official MITRE documentation.These resources are utilized to fine-tune an LLM,enabling it to semantically interpret complex behavioral patterns and infer associated attack techniques,including those employed by previously unknown malware variants.The resulting detection pipeline effectively bridges raw behavioral data with structured threat intelligence.Experimental evaluations confirm the efficacy of the proposed system,with the fine-tuned Gemma 2B model demonstrating significantly enhanced accuracy in associating behavioral features with ATT&CK-defined techniques.This study contributes a fully integrated Linux-specific detection framework,a novel approach for transforming unstructured behavioral data into actionable intelligence,improved interpretability of malicious behavior,and a scalable training process for future applications of LLMs in cybersecurity. 展开更多
关键词 Linux malware dynamic analysis behavior analysis behavioral feature ATT&CK sandbox large language model fine-tuning
在线阅读 下载PDF
数字时代风险分级视域下的算法透明治理
20
作者 陈文兴 张羽芊 《南京邮电大学学报(社会科学版)》 2025年第2期42-49,共8页
算法黑箱、算法歧视等负外部性引发了对算法透明的迫切需求,然而算法技术往往涉及算法持有者的商业秘密,不同的利益取向诱发了算法透明与商业秘密保护之间的紧张关系。风险分级既契合算法透明对于算法安全及算法可信的治理要求,又满足... 算法黑箱、算法歧视等负外部性引发了对算法透明的迫切需求,然而算法技术往往涉及算法持有者的商业秘密,不同的利益取向诱发了算法透明与商业秘密保护之间的紧张关系。风险分级既契合算法透明对于算法安全及算法可信的治理要求,又满足商业秘密保护的发展需求,是平衡安全与发展的重要之策。目前算法透明与算法分级均止步于原则性要求,对算法的未知恐惧催生了对算法透明的盲目追求,因此有必要摒弃全有或全无的路径依赖,在风险分级治理视域下搭建算法有限透明之架构,结合风险导向的源头进行治理。 展开更多
关键词 算法透明 商业秘密保护 风险分级 自动化决策 监管沙盒 算法治理
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部