期刊文献+
共找到214,285篇文章
< 1 2 250 >
每页显示 20 50 100
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
1
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
在线阅读 下载PDF
Security-Reliability Analysis and Optimization for Cognitive Two-Way Relay Network with Energy Harvesting
2
作者 Luo Yi Zhou Lihua +3 位作者 Dong Jian Sun Yang Xu Jiahui Xi Kaixin 《China Communications》 SCIE CSCD 2024年第11期163-179,共17页
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node... This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm. 展开更多
关键词 artificial noise energy harvesting cognitive two-way relay network hardware impairments physical layer security security-reliability tradeoff self-adaptive quantum particle swarm optimization
在线阅读 下载PDF
Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints 被引量:8
3
作者 Qing-Hua Zhu Huan Tang +1 位作者 Jia-Jie Huang Yan Hou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期848-865,共18页
The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this wo... The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this work proposes a novel scheduling method called matching and multi-round allocation(MMA)to optimize the makespan and total cost for all submitted tasks subject to security and reliability constraints.The method is divided into two phases for task scheduling.The first phase is to find the best matching candidate resources for the tasks to meet their preferential demands including performance,security,and reliability in a multi-cloud environment;the second one iteratively performs multiple rounds of re-allocating to optimize tasks execution time and cost by minimizing the variance of the estimated completion time.The proposed algorithm,the modified cuckoo search(MCS),hybrid chaotic particle search(HCPS),modified artificial bee colony(MABC),max-min,and min-min algorithms are implemented in CloudSim to create simulations.The simulations and experimental results show that our proposed method achieves shorter makespan,lower cost,higher resource utilization,and better trade-off between time and economic cost.It is more stable and efficient. 展开更多
关键词 Multi-cloud environment multi-quality of service(QoS) reliability security task scheduling
在线阅读 下载PDF
Paths of China’s Participation in Middle East Security Governance:From the Perspective of the Global Security Initiative
4
作者 Yu Guoqing 《Contemporary World》 2025年第5期32-38,共7页
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch... The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit. 展开更多
关键词 Middle East security Governance middle east Palestinian Israeli Conflict Major Country Responsibility security governance Global security Deficit global security initiative gsi proposed Global security Initiative
在线阅读 下载PDF
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
5
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
Security Engineering of SOA Applications Via Reliability Patterns
6
作者 Luigi Coppolino Luigi Romano Valerio Vianello 《Journal of Software Engineering and Applications》 2011年第1期1-8,共8页
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel... Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services. 展开更多
关键词 reliability of security SERVICES reliability PATTERNS WORKFLOW Systems SOA APPLICATIONS Web SERVICES Technology
在线阅读 下载PDF
Pursuing the Asian Security Model:Strategic Focuses and Practical Approaches
7
作者 Huang Dahui 《Contemporary International Relations》 2025年第4期26-35,共10页
Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for... Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for Asia that features sharing weal and woe,seeking common ground while shelving differences,and prioritizing dialogue and consultation.”1 This fully demonstrates that China prioritizes neighborhood on its diplomatic agenda,regards security and stability in its neighborhood as a core strategic support,and is ready to collaborate with neighboring countries for a future of shared peace,development,and prosperity. 展开更多
关键词 security stability security model model security Asian security common ground dialogue sharing weal woe neighborhood diplomacy
在线阅读 下载PDF
NeuroShield:A Biomimetic Security Model for Web Applications Based on Neural Control Mechanisms
8
作者 Li Tao Bian Qingyuan Hu Aiqun 《China Communications》 2025年第9期226-243,共18页
In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model... In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model,called NeuroShield,specifically designed for web applications.Inspired by the“perception-strategy-effect-feedback”mechanism of the human nervous control system,the model inte-grates biomimetic elements akin of neural receptors and effectors into applications.This integration fa-cilitates a multifaceted approach to security:enabling data introspection for detailed perception and regula-tion of application behavior,providing proactive de-fense capabilities to detect and block security risks in real-time,and incorporating feedback optimization to continuously adjust and enhance security strategies based on prevailing conditions.Experimental results affirm the efficacy of this neural control mechanism-based biomimetic security model,demonstrating a proactive defense success rate exceeding 95%,thereby offering a theoretical and structural foundation for biomimetic immunity in web applications. 展开更多
关键词 active security biometric security security model software security
在线阅读 下载PDF
The Asian Security Model Provides a New Paradigm for Resolving the Security Dilemmas in Asia
9
作者 Liu Qing 《Contemporary International Relations》 2025年第4期18-25,共8页
Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries... Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries suffered from colonial aggression and plundering for a long time in history,they as a whole attach special importance to national security. 展开更多
关键词 national security colonial aggression plundering peace stability security priority colonial aggression security dilemmas Asian security model
在线阅读 下载PDF
Reliability and sensitivity analysis of loop-designed security and stability control system in interconnected power systems 被引量:6
10
作者 Shenghu Li Huimin Zhou +2 位作者 Yunsong Yan Wei Han Jianfeng Ren 《Global Energy Interconnection》 EI CAS CSCD 2022年第5期501-511,共11页
Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Fai... Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid. 展开更多
关键词 security and stability control system(SSCS) Loop design CONTROLLABILITY VULNERABILITY Interconnected power systems Evidence theory Uncertainty controllable capacity.
在线阅读 下载PDF
The Looming Threat Blackout of the National Grid and Critical Infrastructure (A National Security Crisis) 被引量:1
11
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2025年第1期31-35,共5页
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy... The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy. 展开更多
关键词 National grid blackout critical infrastructure security EMP cyberattack resilience AI-powered grid protection ML in energy security power grid vulnerabilities physical attacks on infrastructure predictive maintenance for power grids energy crisis and national security
在线阅读 下载PDF
Failure Modes and Reliability Analysis of Autonomous Underwater Vehicles–A Review
12
作者 Yunsai Chen Qiangguo Niu +5 位作者 Zengkai Liu Boyuan Huang Tianyu Xie Liujun Zhong Danyang Wan Zheng Wang 《哈尔滨工程大学学报(英文版)》 2025年第5期900-924,共25页
Autonomous Underwater Vehicles(AUVs)are pivotal for deep-sea exploration and resource exploitation,yet their reliability in extreme underwater environments remains a critical barrier to widespread deployment.Through s... Autonomous Underwater Vehicles(AUVs)are pivotal for deep-sea exploration and resource exploitation,yet their reliability in extreme underwater environments remains a critical barrier to widespread deployment.Through systematic analysis of 150 peer-reviewed studies employing mixed-methods research,this review yields three principal advancements to the reliability analysis of AUVs.First,based on the hierarchical functional division of AUVs into six subsystems(propulsion system,navigation system,communication system,power system,environmental detection system,and emergency system),this study systematically identifies the primary failure modes and potential failure causes of each subsystem,providing theoretical support for fault diagnosis and reliability optimization.Subsequently,a comprehensive review of AUV reliability analysis methods is conducted from three perspectives:analytical methods,simulated methods,and surrogate model methods.The applicability and limitations of each method are critically analyzed to offer insights into their suitability for engineering applications.Finally,the study highlights key challenges and research hotpots in AUV reliability analysis,including reliability analysis under limited data,AI-driven reliability analysis,and human reliability analysis.Furthermore,the potential of multi-sensor data fusion,edge computing,and advanced materials in enhancing AUV environmental adaptability and reliability is explored. 展开更多
关键词 Autonomous underwater vehicles reliability analysis Failure modes classification Human reliability analysis AI-based reliability analysis Literature review
在线阅读 下载PDF
Research on Railway 5G-R Network Security Technology
13
作者 ZHANG Song WANG Wei +3 位作者 TIAN Zhiji MA Jun SUN Bin SHEN Meiying(Translated) 《Chinese Railways》 2025年第1期29-36,共8页
The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.... The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system. 展开更多
关键词 5G-R network security security risks endogenous security situational awareness
原文传递
Fruits And Challenges of China-Indonesia Security Cooperation Defense cooperation between the two countries provides important support for regional and even global security
14
作者 Yang Danzhi 《China Report ASEAN》 2025年第4期24-25,共2页
In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In Novemb... In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In November 2024,China and Indonesia issued a joint statement during Indonesian President Prabowo Subianto’s visit to China.It was his first overseas trip after his inauguration.In the statement,the two countries agreed to add security cooperation as the fifth pillar of their partnership,marking an upgrade of bilateral ties. 展开更多
关键词 defense cooperation bilateral ties global security security cooperation Indonesia regional security joint statement
在线阅读 下载PDF
The 2024 Global Security Dynamics: Rising Risks of Instability and Growing Demand for Governance
15
作者 Tang Yongsheng 《Contemporary World》 2025年第1期19-23,共5页
In 2024, as the world underwent profound political changes, global security faced increasing instabilities and uncertainties. Traditional and non-traditional security threats interacted and overlapped, and the risk of... In 2024, as the world underwent profound political changes, global security faced increasing instabilities and uncertainties. Traditional and non-traditional security threats interacted and overlapped, and the risk of turmoil increased. Strategic trust among major powers continued to erode, leading to heightened insecurity and intensified competition. 展开更多
关键词 global security major powers competition uncertainties strategic trust traditional security threats INSTABILITIES non traditional security threats
在线阅读 下载PDF
Review of Techniques for Integrating Security in Software Development Lifecycle
16
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
17
作者 Raed Alharthi 《Journal of Computer and Communications》 2025年第2期250-281,共32页
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl... Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy. 展开更多
关键词 Intrusion Detection Cyber-Physical Systems Drone security Weighted Ensemble Voting Unmanned Vehicles security Strategies
在线阅读 下载PDF
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
18
作者 Arshiya Sajid Ansari Ghadir Altuwaijri +3 位作者 Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第6期3713-3752,共40页
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai... IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks. 展开更多
关键词 security in IoT applications PRIVACY-PRESERVING blockchain AI-driven security mechanisms
在线阅读 下载PDF
A Hierarchical Security Situation Assessment Approach for Train Control System under Cyber Attacks
19
作者 Qichang Li Bing Bu Junyi Zhao 《Computers, Materials & Continua》 2025年第6期4281-4313,共33页
With the integration of informatization and intelligence into the Communication-Based Train Control(CBTC)systems,the system is facing an increasing number of information security threats.As an important method of char... With the integration of informatization and intelligence into the Communication-Based Train Control(CBTC)systems,the system is facing an increasing number of information security threats.As an important method of characterizing the system security status,the security situation assessment is used to analyze the system security situation.However,existing situation assessment methods fail to integrate the coupling relationship between the physical layer and the information layer of the CBTC systems,and cannot dynamically characterize the real-time security situation changes under cyber attacks.In this paper,a hierarchical security situation assessment approach is proposed to address the security challenges of CBTC systems,which can perceive cyber attacks,quantify the security situation,and characterize the security situation changes under cyber attacks.Specifically,for the physical layer ofCBTC systems,the impact of cyber attacks is evaluated with the train punctuality rate and train departure interval indicators.For the information layer of CBTC systems,the system vulnerabilities and system threats are selected as static level indicators,and the critical network characteristics are selected as dynamic level indicators to quantify the real-time security situation.Finally,the comprehensive security situation assessment value of the CBTC systems is obtained by integrating the physical and information layer indicators.Simulation results illustrate that the proposed approach can dynamically characterize the real-time security situation of CBTC systems,enhancing the ability to perceive and assess information security risks. 展开更多
关键词 TRANSPORTATION train control system cyber security hierarchical security situation assessment
在线阅读 下载PDF
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
20
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 Network security DCS Nuclear power plant Network security management
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部