期刊文献+
共找到59篇文章
< 1 2 3 >
每页显示 20 50 100
Supramolecular-orchestrated carrier-free chemodynamic synergists with augmented oxidative damage for potentiated cancer therapy
1
作者 Xiaoyi Meng Xinyue Sun +5 位作者 Zhaogang Sun Yue Cheng Yong Wang Jun Ye Yin Xiao Hongqian Chu 《Chinese Chemical Letters》 2025年第5期479-484,共6页
Metal ions trigger Fenton/Fenton-like reactions,generating highly toxic hydroxyl radicals(•OH)for chemodynamic therapy(CDT),which is crucial in inducing lethal oxidative DNA damage and subsequent cell apoptosis.Howeve... Metal ions trigger Fenton/Fenton-like reactions,generating highly toxic hydroxyl radicals(•OH)for chemodynamic therapy(CDT),which is crucial in inducing lethal oxidative DNA damage and subsequent cell apoptosis.However,tumor cells can counteract this damage through repair pathways,particularly MutT homolog 1(MTH1)protein attenuation of oxidative DNA damage.Suppression of MTH1 can enhance CDT efficacy,therefore,orderly integrating Fenton/Fenton-like agents with an MTH1 inhibitor is expected to significantly augment CDT effectiveness.Carrier-free CuTH@CD,self-assembled through the supramolecular orchestration ofγ-cyclodextrin(γ-CD)with Cu^(2+)and the MTH1 inhibitor TH588,effectively overcoming tumor resistance by greatly amplifying oxidative damage capability.Without additional carriers and mediated by multiple supramolecular regulatory effects,CuTH@CD enables high drug loading content,stability,and uniform size distribution.Upon internalization by tumor cells,CuTH@CD invalidates repair pathways through Cu^(2+)-mediated glutathione(GSH)depletion and TH588-mediated MTH1 inhibition.Meanwhile,both generated Cu^(+)ions and existing ones within the nanoassembly initiate a Fentonlike reaction,leading to the accumulation of•OH.This strategy enhances CDT efficiency with minimal side effects,improving oxidative damage potency and advancing self-delivery nanoplatforms for developing effective chemodynamic tumor therapies. 展开更多
关键词 Supramolecular orchestration Carrier-free delivery MTH1 inhibition Chemodynamic therapy Oxidative damage
原文传递
ZmMS1-orchestrated feedback repression loop regulates ZmACSN2/3-PKSB-TKPR1-1/-2 complex to ensure maize pollen development
2
作者 Xueli An Chaowei Fang +6 位作者 Shaowei Zhang Yilin Jiang Xiaofeng Xue Quancan Hou Lina Zhao Ziwen Li Xiangyuan Wan 《Science Bulletin》 2025年第15期2421-2425,共5页
The pollen exine,an inert lipid layer,is the outermost layer of the pollen wall and mainly consists of sporopollenin[1,2].Normal exine contributes to male fertility and geometric patterns of pollen grain[[1],[2],[3]].... The pollen exine,an inert lipid layer,is the outermost layer of the pollen wall and mainly consists of sporopollenin[1,2].Normal exine contributes to male fertility and geometric patterns of pollen grain[[1],[2],[3]].Genetic and physicochemical processes control exine formation and genic male sterility(GMS)genes constitute a significant proportion of identified genetic factors[[1],[2],[3],[4]].To date,more than 200 GMS genes have been identified in plants[4,5].The precise molecular mechanisms underlying exine formation rely on genetic networks established by these GMS genes.However,the specific genetic networks underlying the exine formation remain unclear. 展开更多
关键词 genic male sterility gms genes molecular mechanisms zmms orchestrated feedback repression loop zmacsn tkpr pollen wall inert lipid layeris
原文传递
Designing Human-AI Orchestrated Classrooms:Mechanisms,Protocols,and Governance for Competency-Based Education
3
作者 Xin HUANG 《Artificial Intelligence Education Studies》 2025年第3期14-27,共14页
The pedagogical promise of Competency-Based Education(CBE)has been historically undermined by pro-found challenges of scalability,creating an implementation gap between its theoretical merits and practicalapplication.... The pedagogical promise of Competency-Based Education(CBE)has been historically undermined by pro-found challenges of scalability,creating an implementation gap between its theoretical merits and practicalapplication.This paper proposes a testable mechanism model wherein Artificial Intelligence(Al)enables the scaling of CBE through three interconnected pathways-diagnostic tracking,adaptive supply,and teacher or-chestration-formalized within a distributed cognition framework.To operationalize this model,this paper in-troduces novel constructs including the"Adaptive-Autonomy Curve"for systematically cultivating self-regulated learning in personalized environments,and a"Situated Performance-Based Assessment Pipeline"for authentic,scalable evaluation of complex skills.The primary contributions of this work are fourfold:first,it provides a rigorous conceptual taxonomy that delineates CBE from adjacent paradigms such as mastery learning and per-sonalized learning;second,it advances a set of falsifiable propositions to guide future empirical research;third,it formalizes the human-Al pedagogical relationship with operational design principles;and fourth,it presents an integrated governance and interoperability protocol for the responsible and effective implementation of Al in competency-based systems. 展开更多
关键词 competency-based education(CBE) human AI orchestration adaptive-autonomy curve(self-regulatedl learning) situated performance-based assessment governance&interoperability protocols(shared student model)
在线阅读 下载PDF
Multi-agent deep reinforcement learning for end—edge orchestrated resource allocation in industrial wireless networks 被引量:3
4
作者 Xiaoyu LIU Chi XU +1 位作者 Haibin YU Peng ZENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第1期47-60,共14页
Edge artificial intelligence will empower the ever simple industrial wireless networks(IWNs)supporting complex and dynamic tasks by collaboratively exploiting the computation and communication resources of both machin... Edge artificial intelligence will empower the ever simple industrial wireless networks(IWNs)supporting complex and dynamic tasks by collaboratively exploiting the computation and communication resources of both machine-type devices(MTDs)and edge servers.In this paper,we propose a multi-agent deep reinforcement learning based resource allocation(MADRL-RA)algorithm for end-edge orchestrated IWNs to support computation-intensive and delay-sensitive applications.First,we present the system model of IWNs,wherein each MTD is regarded as a self-learning agent.Then,we apply the Markov decision process to formulate a minimum system overhead problem with joint optimization of delay and energy consumption.Next,we employ MADRL to defeat the explosive state space and learn an effective resource allocation policy with respect to computing decision,computation capacity,and transmission power.To break the time correlation of training data while accelerating the learning process of MADRL-RA,we design a weighted experience replay to store and sample experiences categorically.Furthermore,we propose a step-by-stepε-greedy method to balance exploitation and exploration.Finally,we verify the effectiveness of MADRL-RA by comparing it with some benchmark algorithms in many experiments,showing that MADRL-RA converges quickly and learns an effective resource allocation policy achieving the minimum system overhead. 展开更多
关键词 Multi-agent deep reinforcement learning End-edge orchestrated Industrial wireless networks Delay Energy consumption
原文传递
Orchestrated biomechanical, structural, and biochemical stimuli for engineering anisotropic meniscus
5
《Science Foundation in China》 CAS 2019年第2期11-11,共1页
With the support of the National Natural Science Foundation of China,the research team directed by Prof.Yu JiaKuo(余家阔)and Jiang Dong(江东)at the Knee Surgery Department of the Institute of Sports Medicine,Beijing K... With the support of the National Natural Science Foundation of China,the research team directed by Prof.Yu JiaKuo(余家阔)and Jiang Dong(江东)at the Knee Surgery Department of the Institute of Sports Medicine,Beijing Key Laboratory of Sports Injuries,Peking University Third Hospital,recently reported the innovative results of the tissue engineered meniscus in Science Translational Medicine(2019,487:eaao0750) 展开更多
关键词 orchestrated BIOMECHANICAL BIOCHEMICAL stimuli for ENGINEERING ANISOTROPIC MENISCUS STRUCTURAL
原文传递
Preventing IP Spoofing in Kubernetes Using eBPF
6
作者 Absar Hussain Abdul Aziz +1 位作者 Hassan Jamil Syed Shoaib Raza 《Computers, Materials & Continua》 2025年第8期3105-3124,共20页
Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP s... Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP spoofing attacks.Attackers can exploit this weakness to impersonate legitimate pods,enabling unauthorized access,lateral movement,and large-scale Distributed Denial of Service(DDoS)attacks.Existing security mechanisms such as network policies and intrusion detection systems introduce latency and performance overhead,making them less effective in dynamic Kubernetes environments.This research presents PodCA,an eBPF-based security framework designed to detect and prevent IP spoofing in real time while minimizing performance impact.PodCA integrates with Kubernetes’Container Network Interface(CNI)and uses eBPF to monitor and validate packet metadata at the kernel level.It maintains a container network mapping table that tracks pod IP assignments,validates packet legitimacy before forwarding,and ensures network integrity.If an attack is detected,PodCA automatically blocks spoofed packets and,in cases of repeated attempts,terminates compromised pods to prevent further exploitation.Experimental evaluation on an AWS Kubernetes cluster demonstrates that PodCA detects and prevents spoofed packets with 100%accuracy.Additionally,resource consumption analysis reveals minimal overhead,with a CPU increase of only 2–3%per node and memory usage rising by 40–60 MB.These results highlight the effectiveness of eBPF in securing Kubernetes environments with low overhead,making it a scalable and efficient security solution for containerized applications. 展开更多
关键词 CNCF eBPF PODS SPOOFING IP DDOS container orchestration PACKETS EKS CNI CNM VM
在线阅读 下载PDF
基于MySQL的多地多中心系统架构研究
7
作者 陈杰 方国才 方水波 《机电工程技术》 2025年第3期175-181,共7页
由于单中心的业务系统设计难于满足用户数量及分布范围不断扩大带来的高并发、响应快及高数据安全性要求,研究了一种基于“DNS+全局流量管理(GTM)+MySQL主从复制+dble+orchestrator+keepalived+LVS”多地多中心系统架构。对于无状态的... 由于单中心的业务系统设计难于满足用户数量及分布范围不断扩大带来的高并发、响应快及高数据安全性要求,研究了一种基于“DNS+全局流量管理(GTM)+MySQL主从复制+dble+orchestrator+keepalived+LVS”多地多中心系统架构。对于无状态的应用服务,考虑了异地多活因素,通过DNS与全局流量管理(GTM)提供用户访问流量分流及就近访问业务系统的能力。对于MySQL数据库,考虑了高并发、多中心数据一致性及数据快速响应因素,进行统一中心写就近中心读的分库分表设计,其中MySQL主从复制技术为自身提供了高可用能力,dble提供了MySQL数据库的分库分表及分库分表下的读写分离就近读的能力,orchestrator提供MySQL的高可用管理及联动dble进行高可用切换的能力,LVS为dble提供负载均衡的能力,keepalived提供MySQL就近读和LVS的高可用能力。该架构使用的技术具有高成熟度,满足了业务系统多中心压力分流、快速响应、高可用及容灾要求,为有关系统的多地多中心设计提供一定的借鉴与参考。 展开更多
关键词 多地多中心系统 GTM MYSQL dble orchestrator keepalived LVS
在线阅读 下载PDF
PI3Kβ moonlights as a protein kinase:driving fatty acid metabolism and histone acetylation in cancer
8
作者 Yixin Duan Juanjuan Liu +1 位作者 Jianxin Xu Jing Fang 《Cancer Biology & Medicine》 2025年第6期539-542,共4页
Phosphoinositide 3-kinase(PI3K)catalyzes the conversion of phosphatidylinositol 4,5-bisphosphate(PIP_(2))to phosphatidylinositol 3,4,5-trisphosphate(PIP_(3)),a key second messenger that orchestrates downstream signali... Phosphoinositide 3-kinase(PI3K)catalyzes the conversion of phosphatidylinositol 4,5-bisphosphate(PIP_(2))to phosphatidylinositol 3,4,5-trisphosphate(PIP_(3)),a key second messenger that orchestrates downstream signaling by recruiting and activating effector proteins,such as protein kinase B(AKT).PI3Ks are categorized into four classes(IA,IB,II,and III)based on structural characteristics and substrate preferences1.Class IA PI3K enzymes are heterodimeric complexes composed of a catalytic subunit(p110α,p110β,or p110δ)and a regulatory subunit(p85α,p55α,p50α,p85β,or p55γ)2.Although the catalytic isoforms p110αand p110β,are ubiquitously expressed across tissues,p110δis predominantly found in leukocytes3.Notably,p85αfunctions as the primary regulatory subunit. 展开更多
关键词 P heterodimeric complexes pi k catalytic subunit p p orchestrates downstream signaling
暂未订购
Priority-Based Scheduling and Orchestration in Edge-Cloud Computing:A Deep Reinforcement Learning-Enhanced Concurrency Control Approach
9
作者 Mohammad A Al Khaldy Ahmad Nabot +4 位作者 Ahmad Al-Qerem Mohammad Alauthman Amina Salhi Suhaila Abuowaida Naceur Chihaoui 《Computer Modeling in Engineering & Sciences》 2025年第10期673-697,共25页
The exponential growth of Internet ofThings(IoT)devices has created unprecedented challenges in data processing and resource management for time-critical applications.Traditional cloud computing paradigms cannot meet ... The exponential growth of Internet ofThings(IoT)devices has created unprecedented challenges in data processing and resource management for time-critical applications.Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems,while pure edge computing faces resource constraints that limit processing capabilities.This paper addresses these challenges by proposing a novel Deep Reinforcement Learning(DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments.Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency.The framework introduces three key innovations:(1)a DRL-based dynamic priority assignmentmechanism that learns fromsystem behavior,(2)a hybrid concurrency control protocol combining local edge validation with global cloud coordination,and(3)an integrated mathematical model that formalizes sensor-driven transactions across edge-cloud architectures.Extensive simulations across diverse workload scenarios demonstrate significant quantitative improvements:40%latency reduction,25%throughput increase,85%resource utilization(compared to 60%for heuristicmethods),40%reduction in energy consumption(300 vs.500 J per task),and 50%improvement in scalability factor(1.8 vs.1.2 for EDF)compared to state-of-the-art heuristic and meta-heuristic approaches.These results establish the framework as a robust solution for large-scale IoT and autonomous applications requiring real-time processing with consistency guarantees. 展开更多
关键词 Edge computing cloud computing scheduling algorithms orchestration strategies deep reinforcement learning concurrency control real-time systems IoT
在线阅读 下载PDF
Unraveling the mechanisms of bone diseases:targeting dendritic cells in osteoimmunology for internal homeostasis balance
10
作者 Yanqi Chen Siyuan Wang +3 位作者 Xiaoyu Chen Zhifang Wu Fuming He Qianming Chen 《Bone Research》 2025年第5期1143-1160,共18页
Bone repair and regeneration is a complex spatiotemporal process recruiting a variety of cell types,which need to precisely mediated for effective healing post-damage.The concept of osteoimmunology emphasizes the exte... Bone repair and regeneration is a complex spatiotemporal process recruiting a variety of cell types,which need to precisely mediated for effective healing post-damage.The concept of osteoimmunology emphasizes the extensive and intricate crosstalk between the bone and the immune system.Despite the significant advancements in understanding osteoimmunology,the precise role of dendritic cells(DCs)in this field remains under investigation.As key antigen-presenting cells,DCs are critical in orchestrating adaptive immune responses and maintaining tissue homeostasis.Recent researches have further revealed the potential of DCs to influence the development or acceleration of inflammatory and autoimmune bone disease,as well as their interaction with skeletal cells in the context of bone repair and regeneration. 展开更多
关键词 immune system OSTEOIMMUNOLOGY dendritic cells dcs orchestrating adaptive i bone diseases HOMEOSTASIS bone repair dendritic cells
暂未订购
Solving the puzzle of salicylic acid biosynthesis in plants
11
作者 Pei Miao Jian-Min Zhou 《Journal of Genetics and Genomics》 2025年第11期1305-1307,共3页
Originally extracted from willow bark,salicylic acid(SA)provided the structural basis for the synthesis of acetylsalicylic acid(aspirin)in 1897,a milestone that exemplifies the far-reaching biomedical relevance of pla... Originally extracted from willow bark,salicylic acid(SA)provided the structural basis for the synthesis of acetylsalicylic acid(aspirin)in 1897,a milestone that exemplifies the far-reaching biomedical relevance of plant-derived metabolites(Desborough and Keeling,2017).In plants,SA functions as a pleiotropic phytohormone that orchestrates immune reprogramming,serving as a central mediator of both local defense responses and systemic acquired resistance(SAR). 展开更多
关键词 BIOSYNTHESIS acetylsalicylic acid aspirin pleiotropic phytohormone willow bark orchestrates immune reprogrammingserving salicylic acid willow barksalicylic acid sa provided PLANTS
原文传递
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques 被引量:2
12
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
在线阅读 下载PDF
Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks
13
作者 Pablo Fernández Saura José M.Bernabé Murcia +3 位作者 Emilio García de la Calera Molina Alejandro Molina Zarca Jorge Bernal Bernabé Antonio F.Skarmeta Gómez 《Computers, Materials & Continua》 SCIE EI 2024年第7期163-193,共31页
The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the reali... The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence(AI)-based analytics,empowering seamless integration across the entire Continuum(Edge,Fog,Core,Cloud).This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning(FL)-based anomaly detection in B5Gnetworks.By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm,which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize normal behavior,the systemorchestrates network intelligence to detect and prevent cyber-attacks.Integrated into a B5G Zero-touch Service Management(ZSM)aligned Security Framework,the proposal utilizes multi-domain and multi-tenant orchestration to automate and scale the deployment of FL-agents and AI-based anomaly detectors,enhancing reaction capabilities against cyber-attacks.The proposed FL architecture can be dynamically deployed across the B5G Continuum,utilizing a hierarchy of Network Intelligence orchestrators for real-time anomaly and security threat handling.Implementation includes FL enforcement operations for interoperability and extensibility,enabling dynamic deployment,configuration,and reconfiguration on demand.Performance validation of the proposed solution was conducted through dynamic orchestration,FL,and real-time anomaly detection processes using a practical test environment.Analysis of key performance metrics,leveraging the 5G-NIDD dataset,demonstrates the system’s capability for automatic and near real-time handling of anomalies and attacks,including real-time network monitoring and countermeasure implementation for mitigation. 展开更多
关键词 Federated learning 6G ORCHESTRATION anomaly detection security policy
在线阅读 下载PDF
Efficiency-optimized 6G:A virtual network resource orchestration strategy by enhanced particle swarm optimization
14
作者 Sai Zou Junrui Wu +4 位作者 Haisheng Yu Wenyong Wang Lisheng Huang Wei Ni Yan Liu 《Digital Communications and Networks》 CSCD 2024年第5期1221-1233,共13页
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicin... The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicing of services, and place network functions generated by heterogeneous devices into available resources.This is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO)based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, therebybalancing the local and global solutions and improving the convergence speed to globally near-optimal solutions.Simulations show that the method improves the convergence speed and the utilization of network resourcescompared with other variants of PSO. 展开更多
关键词 VIRTUALIZATION Network function orchestration Network resource virtualized orchestration (NRVO) Particle swarm optimization(PSO)
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
15
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
在线阅读 下载PDF
Fortifying the Digital Bastion: Pioneering Cybersecurity with Dynamic Secrets Management and CMDB Fusion in the Enterprise
16
作者 Gyani Pillala 《Journal of Information Security》 2024年第4期411-418,共8页
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus... In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity. 展开更多
关键词 Dynamic Secrets Management Logical Environments Configuration Management Database (CMDB) Secrets Orchestration M2M (Machine to Machine) Authentication/Authorization Developer Productivity
在线阅读 下载PDF
供应链环境下的物流金融服务——基于3PL的“Orchestrator”角色分析 被引量:10
17
作者 刘晓红 周利国 《中央财经大学学报》 CSSCI 北大核心 2015年第7期74-79,90,共7页
基于学术界对3PL("Third-Party Logistics Providers")演进及其"Orchestrator"角色的理论研究,笔者对供应链环境下的物流金融服务进行了探讨。研究表明:基于成本交易理论、资源基础观以及网络理论支持的3PL的"... 基于学术界对3PL("Third-Party Logistics Providers")演进及其"Orchestrator"角色的理论研究,笔者对供应链环境下的物流金融服务进行了探讨。研究表明:基于成本交易理论、资源基础观以及网络理论支持的3PL的"Orchestrator"角色可用于对供应链环境下的物流金融服务的理论解释。为了充分说明3PL的"Orchestrator"角色在物流金融服务中的作用,笔者还结合了三种具体形式,即工业品供应链物流金融服务、消费品供应链物流金融服务以及物流银行进行了说明。3PL的"Orchestrator"角色研究在物流与供应链管理学术界刚起步,本文从物流金融服务视角丰富了学术界对此议题的讨论,具有理论和实践的双重启示意义。从理论上看,尽管物流金融服务将3PL提升到一个新的运作平台,推进了3PL的演进,但对这一现象,特别是在供应链环境下,学术界尚未给出一个系统的理论解释。本文推进了3PL在物流金融服务中的理论研究。从实践来看,对于3PL来说,只有充分发挥"Orchestrator"角色的作用,才能最大化自身的价值增值空间以及物流金融服务创新的潜力。 展开更多
关键词 3PL Orchestrator 供应链 物流金融
在线阅读 下载PDF
Horizontal-Based Orchestration for Multi-Domain SFC in SDN/NFV-Enabled Satellite/Terrestrial Networks 被引量:13
18
作者 Guanglei Li Huachun Zhou +2 位作者 Bohao Feng Guanwen Li Qi Xu 《China Communications》 SCIE CSCD 2018年第5期77-91,共15页
It's promising to use Software-Defined Networking(SDN) and Network Functions Virtualization(NFV) to integrate satellite and terrestrial networks. To construct network service function chains in such a multi-domain... It's promising to use Software-Defined Networking(SDN) and Network Functions Virtualization(NFV) to integrate satellite and terrestrial networks. To construct network service function chains in such a multi-domain environment, we propose a horizontal-based Multi-domain Service Function Chaining(Md-SFC) orchestration framework. In this framework, multi-domain orchestrators can coordinate with each other to guarantee the end-to-end service quality. Intra-domain orchestrators also coordinate SDN controllers and NFV management components to implement intra-domain service function chains. Based on this, we further propose a heuristic SFC mapping algorithm with a cooperative inter-domain path calculation method to map service function chains to infrastructures. In this method, master multi-domain orchestrator and intra-domain orchestrators coordinate to select proper inter-domain links. We compare the cooperative method with a naive uncooperative way that domains' topology information is provided to the master multi-domain orchestrator and it calculates the shortest inter-domain path between intra-domain service function chains directly. Simulation results demonstrate that our solution is feasible. It is able to construct end-to-end performance guaranteed service function chain by horizontal-based cooperation. The cooperative inter-domain path calculation method decreasesthe mapping load for the master orchestrator and gets the same end-to-end performance. 展开更多
关键词 satellite and terrestrial networks SDN NFV multi-domain orchestration SFC
在线阅读 下载PDF
Event-driven process execution model for process virtual machine 被引量:3
19
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
在线阅读 下载PDF
SDN Orchestration for Dynamic End-to-End Control of Data Center Multi-Domain Optical Networking 被引量:3
20
作者 LIU Lei 《China Communications》 SCIE CSCD 2015年第8期10-21,共12页
New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and hete... New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and heterogeneous optical network domains. This heterogeneity is, not only due to the diverse data transmission and switching technologies, but also due to the different options of control plane techniques. In light of this, the problem of heterogeneous control plane interworking needs to be solved, and in particular, the solution must address the specific issues of multi-domain networks, such as limited domain topology visibility, given the scalability and confidentiality constraints. In this article, some of the recent activities regarding the Software-Defined Networking(SDN) orchestration are reviewed to address such a multi-domain control plane interworking problem. Specifically, three different models, including the single SDN controller model, multiple SDN controllers in mesh, and multiple SDN controllers in a hierarchical setting, are presented for the DC interconnection network with multiple SDN/Open Flow domains or multiple Open Flow/Generalized Multi-Protocol Label Switching( GMPLS) heterogeneous domains. I n addition, two concrete implementations of the orchestration architectures are detailed, showing the overall feasibility and procedures of SDN orchestration for the end-to-endservice provisioning in multi-domain data center optical networks. 展开更多
关键词 software-defined networking(SDN) generalized multi-protocol labelswitching (GMPLS) path computationelement (PCE) data center ORCHESTRATION multi-domain optical network
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部