期刊文献+
共找到411篇文章
< 1 2 21 >
每页显示 20 50 100
Evaluation on Land Ecological Security in Hohhot Based on Principal Component Analysis
1
作者 侯林春 王瑛璇 《Agricultural Science & Technology》 CAS 2017年第7期1255-1259,共5页
Based on the status of land ecological resources in Hohhot, 20 indexes covering nature, resource environment, economy and society were selected and the evaluation index system was established. With the principal compo... Based on the status of land ecological resources in Hohhot, 20 indexes covering nature, resource environment, economy and society were selected and the evaluation index system was established. With the principal component analysis, the land ecological security of Hohhot from 2009 to 2015 was analyzed. The results showed that the land ecological security of Hohhot was declining year by year in 2009-2015. Besides, per capital GDP and public green area, the proportion of in- dustry and the price index of agricultural and animal husbandry production materials were the key factors influencing the land ecological security of Hohhot. The key for protection of the land ecological security may lie in the protection of land quality and prevention of land degradation in farming and stock-breeding areas. 展开更多
关键词 Land ecological security Principal component FACTOR COUNTERMEASURES Hohhot
在线阅读 下载PDF
An Effective Long String Searching Algorithm towards Component Security Testing 被引量:2
2
作者 Jinfu Chen Lili Zhu +4 位作者 Zhibin Xie Michael Omari Hilary Ackah-Arthur Saihua Cai Rubing Huang 《China Communications》 SCIE CSCD 2016年第11期153-169,共17页
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t... In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing. 展开更多
关键词 component testing security detection monitor log abnormal information string-searching
在线阅读 下载PDF
A fault injection model-oriented testing strategy for component security
3
作者 陈锦富 卢炎生 +1 位作者 张卫 谢晓东 《Journal of Central South University》 SCIE EI CAS 2009年第2期258-264,共7页
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje... A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components. 展开更多
关键词 component testing component security fault injection model testing strategy detecting algorithm
在线阅读 下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
4
作者 Jinxin Zuo Yueming Lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 Complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
在线阅读 下载PDF
Identification and Countermeasures for China’s Oil Security Risks under the Dual Carbon Goals
5
作者 Wang Nengquan 《China Oil & Gas》 2025年第3期11-21,共11页
This paper reviews the history and lessons of global oil crises while exploring the establishment of a quantitative evaluation model for oil security with Chinese characteristics.Using principal component analysis,it ... This paper reviews the history and lessons of global oil crises while exploring the establishment of a quantitative evaluation model for oil security with Chinese characteristics.Using principal component analysis,it constructs an oil security evaluation indicator system for China with two main-level indicators:foreign oil dependency and its impacts,and market intervention and security assurance. 展开更多
关键词 establishment quantitative evaluation model dual carbon goals principal component analysisit quantitative evaluation model foreign oil dependency market intervention security assurance principal component analysis oil security
在线阅读 下载PDF
Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust Secure BERT Finetuning
6
作者 Nouman Ahmad Changsheng Zhang Uroosa Sehar 《Computers, Materials & Continua》 2026年第4期860-876,共17页
Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed too... Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed tool outputs.When dealing with technical language,the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques.We introduce a three-phase approach for improved NER inmulti-source cybersecurity data that makes use of large language models(LLMs).To ensure thorough entity coverage,our method starts with an identification module that uses dynamic prompting techniques.To lessen hallucinations,the extraction module uses confidence-based self-assessment and cross-checking using regex validation.The tagging module links to knowledge bases for contextual validation and uses SecureBERT in conjunction with conditional random fields to detect entity boundaries precisely.Our framework creates efficient natural language segments by utilizing decoderbased LLMs with 10B parameters.When compared to baseline SecureBERT implementations,evaluation across four cybersecurity data sources shows notable gains,with a 9.4%–25.21%greater recall and a 6.38%–17.3%better F1-score.Our refined model matches larger models and achieves 2.6%–4.9%better F1-score for technical phrase recognition than the state-of-the-art alternatives Claude 3.5 Sonnet,Llama3-8B,and Mixtral-7B.The three-stage architecture identification-extraction-tagging pipeline tackles important cybersecurity NER issues.Through effective architectures,these developments preserve deployability while setting a new standard for entity extraction in challenging security scenarios.The findings show how specific enhancements in hybrid recognition,validation procedures,and prompt engineering raise NER performance above monolithic LLM approaches in cybersecurity applications,especially for technical entity extraction fromheterogeneous sourceswhere conventional techniques fall short.Because of itsmodular nature,the framework can be upgraded at the component level as new methods are developed. 展开更多
关键词 Information extraction large language models NER open-source intelligence security automation
在线阅读 下载PDF
Sustainable livelihood security in Odisha, India: A district level analysis 被引量:1
7
作者 Braja SUNDAR PANI Diptimayee MISHRA 《Regional Sustainability》 2022年第2期110-121,共12页
Sustainable livelihood security(SLS) is an integrating framework that encompasses current concerns and policy requirements for ecological, social, and economic dimensions of sustainable development. It carries particu... Sustainable livelihood security(SLS) is an integrating framework that encompasses current concerns and policy requirements for ecological, social, and economic dimensions of sustainable development. It carries particular importance for developing economies. This study intends to verify the relative status of SLS of the 30 districts in Odisha, which is a backward state in eastern India. In this study, a total of 22 relevant indicators relating to the three components of SLS—ecological security, social equity, and economic efficiency have been taken, based on various kinds of government reports. The principal component analysis(PCA) was used to ascertain the indicators and the importance of each of them to the corresponding component of SLS. The ecological security index(ESI), social equity index(SEI), economic efficiency index(EEI), and composite sustainable livelihood security index(CSLSI) of each district of Odisha were calculated through the min-max normalization technique. The results revealed that there are wide variations in SLS among the districts of Odisha. In this study, the districts are categorized into four levels based on the scores of ESI, SEI, EEI, and CSLSI as very low(<0.400), low(0.400–0.549), medium(0.550–0.700), and high(>0.700). According to the classification result of CSLSI, 2 districts are found to be in the very low category, 20 districts are under the low sustainability category, 8 districts are in the medium category, and none of the districts are found to be in the high sustainability category. The district of Sambalpur ranks the highest with a CSLSI score of 0.624. The bottom five districts are Gajapati, Bolangir, Nabarangpur, Kandhamal, and Malkangiri, having the CSLSI scores of 0.438, 0.435, 0.406, 0.391, and 0.344, respectively. The result of this study suggests that region-specific, systematic, and proactive approaches are desirable for balanced development in Odisha. Further, policy intervention is required to implement more inclusive tribal welfare policies. 展开更多
关键词 Sustainable livelihood security Ecological security index Social equity index Economic efficiency index Odisha Principal component analysis
在线阅读 下载PDF
A Quantitative Factorial Component Analysis to Investigate the Recent Changes of Japan’s Weight-Based Food Self-Sufficiency Ratio 被引量:1
8
作者 Kunihisa Yoshii Tatsuo Oyama 《American Journal of Operations Research》 2016年第1期44-60,共17页
We investigate the weight-based food self-sufficiency ratio (WSSR) for Japan over a 50-year period (1961-2011) by applying factorial component analysis technique in order to measure the changes of the WSSR quantitativ... We investigate the weight-based food self-sufficiency ratio (WSSR) for Japan over a 50-year period (1961-2011) by applying factorial component analysis technique in order to measure the changes of the WSSR quantitatively. Quantitative data analysis is employed to determine the drivers of those changes. Numerical results show that Japan experienced a drastic decline in its food self-sufficiency ratio (FSSR) during the above period. The factorial component analysis shows that such a decline was caused by the changes in the FSSR of the food groups/items, not in the quantity of the food supply. A number of characteristics of those changes are presented and a list of major food groups that have major impacts on the changes is constructed. The findings in this paper reiterate the alarming food security problem in Japan and provide clear insight into the causes of this problem. The findings in this study pick up where previous studies have left off, aid the food-related policy-making process and identify new ideas for future food research. 展开更多
关键词 Food Self-Sufficiency Ratio Food security Factorial component Analysis
在线阅读 下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
9
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic Design Flaws components Integration Flaws E-Commerce System Assurance & security Model Based Design Business Logic Attacks Attack Pattern
在线阅读 下载PDF
MSMAM:Testing Resources Allocation,Obtaining Non-Functional Indexes Based on Functional Testing Results,and Evaluating Security
10
作者 CAO Hui ZHANG Huanguo YAN Fei 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期504-510,共7页
Security testing is a key technology for software security.The testing results can reflect the relationship between software testing and software security,and they can help program designers for evaluating and improvi... Security testing is a key technology for software security.The testing results can reflect the relationship between software testing and software security,and they can help program designers for evaluating and improving software security.However,it is difficult to describe by mathematics the relationship between the results of software functional testing and software nonfunctional security indexes.In this paper,we propose a mathematics model(MSMAM)based on principal component analysis and multiattribute utility theory.This model can get nonfunctional security indexes by analyzing quantized results of functional tests.It can also evaluate software security and guide the effective allocation of testing resources in the process of software testing.The feasibility and effectiveness of MSMAM is verified by experiments. 展开更多
关键词 software testing software security principal component analysis multi-attribute theory security evaluation
原文传递
Concepts of Safety Critical Systems Unification Approach &Security Assurance Process
11
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Umar Mahmood Usman Iqbal 《Journal of Information Security》 2020年第4期292-303,共12页
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon... The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems. 展开更多
关键词 System security Assurance of component Function Safety-Critical Software Software Assurance
在线阅读 下载PDF
国家安全视阈下的GenAI翻译数据安全:构成要素、风险表征与治理实践
12
作者 王贇 王均松 《浙江外国语学院学报》 2026年第1期103-112,共10页
生成式人工智能(GenAI)的迅猛发展推动了翻译数据的海量生成与高速传播,这些数据与国家信息安全紧密关联,其安全问题已成为维护国家总体安全的重要组成部分。本文首先界定GenAI翻译数据安全的内涵,提出其具有系统性、层级性和周期性特征... 生成式人工智能(GenAI)的迅猛发展推动了翻译数据的海量生成与高速传播,这些数据与国家信息安全紧密关联,其安全问题已成为维护国家总体安全的重要组成部分。本文首先界定GenAI翻译数据安全的内涵,提出其具有系统性、层级性和周期性特征,明确其构成要素为文本数据安全、元信息数据安全和用户数据安全。随后,本文分析GenAI时代翻译数据的风险表征,如数据滥用、数据篡改、隐私泄露和数据偏见等,并提出针对性的治理实践路径,如加强安全技术保障、完善数据管理机制、提升数据安全意识等,以期为国家翻译事业的数据安全保障提供参考。 展开更多
关键词 GenAI 翻译数据 数据安全 构成要素 风险 治理
在线阅读 下载PDF
基于不同纠缠态光场的四组分量子秘密共享
13
作者 房昱同 周瑶瑶 王昱焜 《四川大学学报(自然科学版)》 北大核心 2026年第2期415-423,共9页
量子秘密共享(Quantum Secret Sharing,QSS)是量子密码学的重要分支之一,用于多个用户之间的秘密共享,在量子计算和量子通信等领域有着很大的应用潜力。随着量子信息的迅速发展,人们对QSS的用户数量及安全性有了更高的要求。本文分析了... 量子秘密共享(Quantum Secret Sharing,QSS)是量子密码学的重要分支之一,用于多个用户之间的秘密共享,在量子计算和量子通信等领域有着很大的应用潜力。随着量子信息的迅速发展,人们对QSS的用户数量及安全性有了更高的要求。本文分析了连续变量四组分束缚纠缠(Bound Entanglement,BE)态、Greenberger-Horn-Zeilinge(r GHZ)态与Cluster态这3种纠缠态光场的纠缠特性,并以它们作为量子资源来构建四组分的QSS方案;通过理论计算,明确各方案中QSS的安全性与不同物理参量的依赖关系。此外,从多方面对比分析了不同方案的应用优势,为后续不同应用场景中QSS方案的选取提供参考。 展开更多
关键词 量子秘密共享 四组分纠缠态光场 安全性 对比分析
在线阅读 下载PDF
港口装船机设备安全检测技术分析
14
作者 周科 《今日自动化》 2026年第2期142-144,共3页
港口装船机是船运物资在港口装卸时需要使用到的关键设备之一,其质量与性能直接关系到货物装载效率及安全性。由于使用过程长期暴露于外界恶劣环境中,港口装船机会出现各种各样的安全隐患问题,若不及时进行处理,会对港口运输工作造成阻... 港口装船机是船运物资在港口装卸时需要使用到的关键设备之一,其质量与性能直接关系到货物装载效率及安全性。由于使用过程长期暴露于外界恶劣环境中,港口装船机会出现各种各样的安全隐患问题,若不及时进行处理,会对港口运输工作造成阻碍,甚至诱发安全风险。因此,定期对港口装船机进行安全检测十分必要,但该项工作较复杂,实际执行过程中通常会遇到一定的操作难点。文章对某港口装船机设备的安全检测工作展开了分析,在了解实际检测难点的基础上,提出了一系列针对性的解决措施,以期为相关人员提供参考。 展开更多
关键词 装船机设备 安全检测 无人机辅助 传动部件
在线阅读 下载PDF
特殊地形下大吨位桥梁施工缆索吊装系统设计与关键技术研究
15
作者 高雄 《价值工程》 2026年第5期47-50,共4页
随着我国交通路网向复杂地形延伸,大跨度桥梁在深谷江河处的施工挑战日益突出。缆索吊装系统凭借其强大的地形适应性与大吨位吊装能力,在此类工程中起到关键作用。本文以某特大桥为依托,针对其喀斯特峡谷、岸坡陡峭、场地局促等特殊条件... 随着我国交通路网向复杂地形延伸,大跨度桥梁在深谷江河处的施工挑战日益突出。缆索吊装系统凭借其强大的地形适应性与大吨位吊装能力,在此类工程中起到关键作用。本文以某特大桥为依托,针对其喀斯特峡谷、岸坡陡峭、场地局促等特殊条件,系统研究了大吨位缆索吊装系统(跨径459.5m,起重量2×200t)的设计、关键技术与安全控制。重点探讨了扣塔-缆塔协同、长距离大吨位吊装、拱肋多节段悬拼、合龙精度及施工监控等核心问题,并结合实践总结了系统设计、安装调试、吊装工艺与风险管理方面的经验,以期为类似特殊地形下的大跨度桥梁施工提供参考。 展开更多
关键词 特殊地形 大吨位构件吊装 缆索吊装系统 结构设计 施工技术 安全控制
在线阅读 下载PDF
基于深度学习的开源组件漏洞发现和评估研究
16
作者 程明 董晓祺 +2 位作者 蔡清远 郭伟强 许志毅 《电气自动化》 2026年第2期93-96,共4页
为解决传统扫描技术在面对大规模异构项目时因依赖规则或特征工程而导致性能受限的问题,提出了一种融合深度学习的自动化漏洞检测与评估模型。引入融合数据流与控制流分析的语义切片策略,实现对关键漏洞上下文的细粒度建模;结合基于抽... 为解决传统扫描技术在面对大规模异构项目时因依赖规则或特征工程而导致性能受限的问题,提出了一种融合深度学习的自动化漏洞检测与评估模型。引入融合数据流与控制流分析的语义切片策略,实现对关键漏洞上下文的细粒度建模;结合基于抽象语法树路径感知与注意力机制的代码表示学习方法,有效提取结构与语义特征。最终,采用双向长短时记忆网络对特征序列进行建模与分类。试验结果表明,所提模型在F1分数等核心指标上显著优于VulDeepecker等主流模型。所提模型具备良好的自动化检测能力与工程适用性,为开源组件漏洞的智能化识别与风险评估提供了有效路径。 展开更多
关键词 开源组件安全 漏洞智能化检测 深度学习应用 代码表示学习 抽象语法树
在线阅读 下载PDF
An Improved String-Searching Algorithm and Its Application in Component Security Testing 被引量:2
17
作者 Jinfu Chen Saihua Cai +4 位作者 Lili Zhu Yuchi Guo Rubing Huang Xiaolei Zhao Yunqi Sheng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期281-294,共14页
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor... Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches. 展开更多
关键词 component testing security vulnerabilities detection monitor log abnormal information string-searching
原文传递
Design and Implementation of Secure Subnet Inside of Data Sensitive Network
18
作者 Haiwei Xue Yunliang Zhang +1 位作者 Zhien Guo Yiqi Dai 《Journal of Software Engineering and Applications》 2013年第3期51-57,共7页
Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whethe... Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even designed impeccable access control policies, we still cannot prevent inside leak. A nature solution is using physical isolation to prevent sensitive data from being leaked outside network;however inside the physical isolated network, data still can be spread from one subnet to another. We present Secure Subnet System, a BLP model base security system that can provide more strong access control, which is called mandatory action control. In our system after a user read sensitive data, system will dynamically change security policies to prevent the user to leak these data or spread the data outside to another subnet. We use a state machine model to describe our system, and use secure transfer equations to dynamically calculate the system policies for each new state. Our model can be proved to be secure by formal methods. We implemented a demon of our system. In this paper we also show the design details of the demon and evaluate the demon both from security and performance. The evaluation results show that the output of the security tests case are under expected;and the performance test case show that, for the 64KB IO chunk size, IO read loss can be improved to 6.6%, IO write loss can be improved to 1.2% after optimization. 展开更多
关键词 component PRIVACY Netwrok security Access Control INSIDE LEAK security Model BLP
暂未订购
基于命名实体识别的大规模物联网二进制组件识别
19
作者 张立孝 马垚 +2 位作者 杨玉丽 于丹 陈永乐 《计算机应用》 北大核心 2025年第7期2288-2295,共8页
物联网(IoT)设备厂商在固件开发中通常会大量复用基于开源代码编译而成的开源组件,每个固件通常由上百个这样的组件构成。如果这些组件未能及时更新,未打上安全补丁的开源组件可能会携带着漏洞集成到固件中,进而给IoT设备埋下安全隐患... 物联网(IoT)设备厂商在固件开发中通常会大量复用基于开源代码编译而成的开源组件,每个固件通常由上百个这样的组件构成。如果这些组件未能及时更新,未打上安全补丁的开源组件可能会携带着漏洞集成到固件中,进而给IoT设备埋下安全隐患。因此,识别IoT固件中的二进制组件对于确保IoT设备的安全性至关重要。针对现有方法难以大规模识别二进制组件的问题,提出一种基于命名实体识别(NER)的大规模IoT二进制组件识别方法。首先,通过固件解压提取固件内部的二进制组件;然后,通过可读字符串提取和组件执行这两个方式获取组件的语义信息;最后,利用RoBERTa-BiLSTM-CRF的NER模型识别组件名和版本号。在12个流行的IoT生产商发布的6 575个固件上的实验结果表明,所提方法获得了87.67%的F1值,可成功识别163个二进制组件。可见,该方法有效扩大了IoT固件中二进制组件的识别范围,有助于从软件供应链的角度保障固件安全。 展开更多
关键词 物联网 软件供应链 组件识别 固件安全 命名实体识别
在线阅读 下载PDF
基于PCA-RLR模型的低成本物联网入侵检测方法研究
20
作者 刘子毅 宋华珠 《华中师范大学学报(自然科学版)》 北大核心 2025年第6期831-842,共12页
随着智能家居与物联网设备的广泛普及,用户对潜在网络安全威胁识别需求日益增长,低成本的入侵检测研究成为物联网安全领域中广泛关注的研究热点.本文探索了一种基于机器学习的低成本物联网入侵检测方法,即融合多种正则化方法和基于主成... 随着智能家居与物联网设备的广泛普及,用户对潜在网络安全威胁识别需求日益增长,低成本的入侵检测研究成为物联网安全领域中广泛关注的研究热点.本文探索了一种基于机器学习的低成本物联网入侵检测方法,即融合多种正则化方法和基于主成分分析(PCA)降维的物联网流量入侵检测(PCA-RLR)模型,旨在显著提升网络安全防护的效能.研究通过优化并融合多种正则化方法以提高模型的鲁棒性,运用PCA方法进行高维数据特征精炼与维度缩降,从而构建一个有效识别正常流量与异常攻击的二分类器模型,以提供安全预警.实验结果表明,融合多种正则化方法与PCA的对数几率回归模型在物联网入侵检测任务中表现出优异的性能.其中,L2正则化增强了模型的稳定性和泛化能力;PCA显著减少了特征空间维度,在较低计算复杂性下仅造成微小性能损失;仿真实验还验证了自适应求解器在不同数据集特性上的有效性.实验结果表明,本研究提出的低成本物联网入侵检测模型,在测试集上实现了较高的检测准确率和较低的误报率.研究成果为网络入侵检测提供了一种新的低成本方法,具有在实际智能家居与物联网设备安全防护中广泛应用的潜力. 展开更多
关键词 物联网安全 入侵检测 低成本计算 主成分分析(PCA) 正则化方法
在线阅读 下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部