选注者言:本文的主题句开门见山地告诉读者:frequent tippling(少喝常饮,常饮少量烈酒)of beer,wine or even spirits lowers a man’s risk of heart attack(心脏病发作)。但是,让我们感到不解的是文中的另一句话:alcohol affects wome...选注者言:本文的主题句开门见山地告诉读者:frequent tippling(少喝常饮,常饮少量烈酒)of beer,wine or even spirits lowers a man’s risk of heart attack(心脏病发作)。但是,让我们感到不解的是文中的另一句话:alcohol affects womendifferently than men and that it would be"premature and unwise"to extrapolate(推断)the results beyond men。现代科技尚不能揭开这个谜:男性每日少量饮酒能降低心脏病的风险,而女性经常喝酒,却会增加得乳腺癌的机会。此句中的premature and unwise可以学用,而extrapolate一词则用得太文绉绉了。展开更多
The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs a...The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs are generated by the MULVAL(Multi-host, Multistage Vulnerability Analysis) tool according to sufficient information of vulnerabilities, network configurations and host connectivity on networks. Secondly, the probabilistic attack graph is established according to the causal relationships among sophisticated multi-stage attacks by using Bayesian Networks. The probability of successful exploits is calculated by combining index of the Common Vulnerability Scoring System, and the static security risk is assessed by applying local conditional probability distribution tables of the attribute nodes. Finally, the overall security risk in a small network scenario is assessed. Experimental results demonstrate our work can deduce attack intention and potential attack paths effectively, and provide effective guidance on how to choose the optimal security hardening strategy.展开更多
Introduction: In 2008, cardiovascular disease (CVD) accounted for one in three deaths in the United States. Epidemiological analyses suggest that two or more risk factors are the indicator of high risk and/or poor CVD...Introduction: In 2008, cardiovascular disease (CVD) accounted for one in three deaths in the United States. Epidemiological analyses suggest that two or more risk factors are the indicator of high risk and/or poor CVD outcomes. Knowledge of heart attack and stroke symptomology has been the focus of much research based on the assumption that accurate identification of an event is critical to reducing time to treatment. There is a paucity of research showing a clear association between knowledge of heart attack and stroke symptomology, risk factors, and mortality rates. In this study, we hypothesized that high stroke and heart attack symptomology knowledge scores would correspond to lower stroke or CVD mortality rankings as well as to a lower prevalence of two or more CVD risk factors. Methods: State was the unit of analysis used to examine data from two different sources and combined into a customized database. The first source was a multiyear Behavioral Risk Factor Surveillance Survey (BRFSS) heart attack and stroke symptom knowledge module database. CVD and stroke mortality data used came from the American Heart Association’s (AHA) 2012 Heart Disease and Stroke Statistics Update. Spearman’s Rho was the test statistic. Results: A moderate negative correlation was found between high heart attack and stroke symptom knowledge scores and the percentage of adults with two or more CVD or stroke risk factors. Likewise, a similar correlation resulted from the two variables, high heart attack and stroke symptoms knowledge score and CVD mortality rank. Conclusions: This study demonstrated a significant relationship between high heart attack and stroke symptom knowledge and lower CVD mortality rates and lower prevalence of two or more CVD risk factors at the state level. Our findings suggest that it is important to continue education efforts regarding heart attack and stroke symptom knowledge. Pharmacists are one group of health care providers who could enhance the needed public health education efforts.展开更多
Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. A...Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.展开更多
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har...Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective.展开更多
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi...In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk.展开更多
The World Meteorological Organization estimates that about 90 percent of all natural disasters is extreme meteorological hazards like typhoon/hurricane and tropical cyclone triggered disasters. With the increasing ten...The World Meteorological Organization estimates that about 90 percent of all natural disasters is extreme meteorological hazards like typhoon/hurricane and tropical cyclone triggered disasters. With the increasing tendency of natural hazards, the typhoon induced surge, wave, precipitation, flood and wind as extreme external loads menacing Nuclear Power Plants (NPP) in coastal and inland provinces of China. For all of the planned, designed and constructed NPP in China the National Nuclear Safety Administration of China and IAEA recommended Probable Maximum Hurricane/ Typhoon/(PMH/T), Probable Maximum Storm Surge (PMSS), Probable Maximum Flood (PMF), Design Basis Flood (DBF) as safety regulations recommended for NPP defense infrastructures. This paper discusses the joint probability analysis of simultaneous occurrence typhoon induced extreme external hazards and compared with IAEA 2003-2011 recommended safety regulations for some NPP along China coast to make safety assessment based on the “As Low As Reasonable Practice” (ALARP) principle.展开更多
文摘选注者言:本文的主题句开门见山地告诉读者:frequent tippling(少喝常饮,常饮少量烈酒)of beer,wine or even spirits lowers a man’s risk of heart attack(心脏病发作)。但是,让我们感到不解的是文中的另一句话:alcohol affects womendifferently than men and that it would be"premature and unwise"to extrapolate(推断)the results beyond men。现代科技尚不能揭开这个谜:男性每日少量饮酒能降低心脏病的风险,而女性经常喝酒,却会增加得乳腺癌的机会。此句中的premature and unwise可以学用,而extrapolate一词则用得太文绉绉了。
基金Supported by the National Natural Science Foundation of China(61373176)the Natural Science Foundation of Shaanxi Province of China(2015JQ7278)the Scientific Research Plan Projects of Shaanxi Educational Committee(17JK0304,14JK1693)
文摘The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs are generated by the MULVAL(Multi-host, Multistage Vulnerability Analysis) tool according to sufficient information of vulnerabilities, network configurations and host connectivity on networks. Secondly, the probabilistic attack graph is established according to the causal relationships among sophisticated multi-stage attacks by using Bayesian Networks. The probability of successful exploits is calculated by combining index of the Common Vulnerability Scoring System, and the static security risk is assessed by applying local conditional probability distribution tables of the attribute nodes. Finally, the overall security risk in a small network scenario is assessed. Experimental results demonstrate our work can deduce attack intention and potential attack paths effectively, and provide effective guidance on how to choose the optimal security hardening strategy.
文摘Introduction: In 2008, cardiovascular disease (CVD) accounted for one in three deaths in the United States. Epidemiological analyses suggest that two or more risk factors are the indicator of high risk and/or poor CVD outcomes. Knowledge of heart attack and stroke symptomology has been the focus of much research based on the assumption that accurate identification of an event is critical to reducing time to treatment. There is a paucity of research showing a clear association between knowledge of heart attack and stroke symptomology, risk factors, and mortality rates. In this study, we hypothesized that high stroke and heart attack symptomology knowledge scores would correspond to lower stroke or CVD mortality rankings as well as to a lower prevalence of two or more CVD risk factors. Methods: State was the unit of analysis used to examine data from two different sources and combined into a customized database. The first source was a multiyear Behavioral Risk Factor Surveillance Survey (BRFSS) heart attack and stroke symptom knowledge module database. CVD and stroke mortality data used came from the American Heart Association’s (AHA) 2012 Heart Disease and Stroke Statistics Update. Spearman’s Rho was the test statistic. Results: A moderate negative correlation was found between high heart attack and stroke symptom knowledge scores and the percentage of adults with two or more CVD or stroke risk factors. Likewise, a similar correlation resulted from the two variables, high heart attack and stroke symptoms knowledge score and CVD mortality rank. Conclusions: This study demonstrated a significant relationship between high heart attack and stroke symptom knowledge and lower CVD mortality rates and lower prevalence of two or more CVD risk factors at the state level. Our findings suggest that it is important to continue education efforts regarding heart attack and stroke symptom knowledge. Pharmacists are one group of health care providers who could enhance the needed public health education efforts.
基金The Research of Key Technology and Application of Information Security Certification Project(No.2016YFF0204001)
文摘Network security equipment is crucial to information systems, and a proper evaluation model can ensure the quality of network security equipment. However, there is only a few models of comprehensive models nowadays. An index system for network security equipment was established and a model based on attack tree with risk fusion was proposed to obtain the score of qualitative indices. The proposed model implements attack tree model and controlled interval and memory(CIM) model to solve the problem of quantifying qualitative indices, and thus improves the accuracy of the evaluation.
基金supported by the Jiangsu Provincial Natural Science Foundation of China(no.BK20150721)the 2017 National Key Research and Development Program of China(no.2017YFB0802900)
文摘Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective.
基金supported by the project of the State Key Program of National Natural Science Foundation of China (No. 90818021)supported by a grant from the national high technology research and development program of China (863program) (No.2012AA012903)
文摘In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk.
文摘The World Meteorological Organization estimates that about 90 percent of all natural disasters is extreme meteorological hazards like typhoon/hurricane and tropical cyclone triggered disasters. With the increasing tendency of natural hazards, the typhoon induced surge, wave, precipitation, flood and wind as extreme external loads menacing Nuclear Power Plants (NPP) in coastal and inland provinces of China. For all of the planned, designed and constructed NPP in China the National Nuclear Safety Administration of China and IAEA recommended Probable Maximum Hurricane/ Typhoon/(PMH/T), Probable Maximum Storm Surge (PMSS), Probable Maximum Flood (PMF), Design Basis Flood (DBF) as safety regulations recommended for NPP defense infrastructures. This paper discusses the joint probability analysis of simultaneous occurrence typhoon induced extreme external hazards and compared with IAEA 2003-2011 recommended safety regulations for some NPP along China coast to make safety assessment based on the “As Low As Reasonable Practice” (ALARP) principle.