期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
1
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
A comprehensive survey on the methods of angle of attack measurement and estimation in UAVs
2
作者 L.SANKARALINGAM C.RAMPRASADH 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2020年第3期749-770,共22页
Angle of Attack(AOA) is a crucial parameter which directly affects the aerodynamic forces of an aircraft.The measurement of AOA is required to ensure a safe flight within its designed flight envelop.This paper intends... Angle of Attack(AOA) is a crucial parameter which directly affects the aerodynamic forces of an aircraft.The measurement of AOA is required to ensure a safe flight within its designed flight envelop.This paper intends to summarise a comprehensive survey on the measurement techniques and estimation methods for AOA, specifically in Unmanned Aerial Vehicle(UAV) applications.In the case of UAVs, weight constraint plays a major role as far as sensor suites are concerned.This results in selecting a suitable estimation method to extract AOA using the available data from the autopilot.The most feasible and widely employed AOA measurement technique is by using the Multi-Hole Probes(MHPs).The MHP measures the AOA regarding the pressure variations between the ports.Due to the importance of MHP in AOA measurement, the calibration methods for the MHP are also included in this paper.This paper discusses the AOA measurement using virtual AOA sensors, their importance and the operation. 展开更多
关键词 Angle of attack estimation Angle of attack measurement Angle of attack vane Five-hole probe Multi-hole probe Multi-hole probe calibration Nine-hole probe Seven-hole probe Virtual angle of attack sensor
原文传递
Advancing the database security of multi-round quantum private query protocols
3
作者 Fei Gao 《Science China(Physics,Mechanics & Astronomy)》 2025年第8期274-275,共2页
Quantum private query(QPQ)protocols have emerged as a pivotal innovation in quantum cryptography,offering users the ability to retrieve specific database information while preserving privacy.However,the practical impl... Quantum private query(QPQ)protocols have emerged as a pivotal innovation in quantum cryptography,offering users the ability to retrieve specific database information while preserving privacy.However,the practical implementation of these protocols faces significant security challenges,particularly from joint-measurement attacks in multi-round query scenarios.A recent study by Liu et al.addresses these vulnerabilities through a comprehensive analysis and proposes innovative solutions,marking a critical advancement in the field[1]. 展开更多
关键词 joint measurement attacks quantum private query quantum cryptography quantum cryptographyoffering database security multi round protocols retrieve specific database information security challenges
原文传递
Online Pattern Recognition and Data Correction of PMU Data Under GPS Spoofing Attack 被引量:3
4
作者 Ancheng Xue Feiyang Xu +3 位作者 Jingsong Xu Joe H.Chow Shuang Leng Tianshu Bi 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第6期1240-1249,共10页
Smart grids are increasingly dependent on data with the rapid development of communication and measurement.As one of the important data sources of smart grids,phasor measurement unit(PMU)is facing the high risk from a... Smart grids are increasingly dependent on data with the rapid development of communication and measurement.As one of the important data sources of smart grids,phasor measurement unit(PMU)is facing the high risk from attacks.Compared with cyber attacks,global position system(GPS)spoofing attacks(GSAs)are easier to implement because they can be exploited by portable devices,without the need to access the physical system.Therefore,this paper proposes a novel method for pattern recognition of GSA and an additional function of the proposed method is the data correction to the phase angle difference(PAD)deviation.Specifically,this paper analyzes the effect of GSA on PMU measurement and gives two common patterns of GSA,i.e.,the step attack and the ramp attack.Then,the method of estimating the PAD deviation across a transmission line introduced by GSA is proposed,which does not require the line parameters.After obtaining the estimated PAD deviations,the pattern of GSA can be recognized by hypothesis tests and correlation coefficients according to the statistical characteristics of the estimated PAD deviations.Finally,with the case studies,the effectiveness of the proposed method is demonstrated,and the success rate of the pattern recognition and the online performance of the proposed method are analyzed. 展开更多
关键词 global position system(GPS) GPS spoofing attack(GSA) phasor measurement pattern recognition data correction line parameter
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部