期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Construction and Application of Cloud Computing Model for Reciprocal and Collaborative Knowledge Management
1
作者 Jingqi Li Yijie Bian +1 位作者 Jun Guan Lu Yang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1119-1137,共19页
Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management.Existing research focuses on the constr... Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management.Existing research focuses on the construction of knowledge management systems and knowledge sharing and transfer mechanisms.With the rapid development and application of cloud computing and big data technology,knowledge management is faced with many problems,such as how to combine with the new generation of information technology,how to achieve integration with organizational business processes,and so on.To solve such problems,this paper proposes a reciprocal collaborative knowledge management model(RCKMmodel)based on cloud computing technology,reciprocity theory,and collaboration technology.RCKM model includes project group management and cloud computing technology,which can realize management,finance,communication,and quality assurance of multiple projects and solve the problem of business integration with knowledge management.This paper designs evaluation methods of tacit knowledge and reciprocity preference based on the Bayesian formula and analyzes their effect with simulation data.The methods can provide quantitative support for the integration of knowledge management and business management to realize reciprocity and collaboration in the RCKM model.The research found that RCKM model can fully use cloud computing technology to promote the integration of knowledge management and organizational business,and the evaluation method based on the Bayesian formula can provide relatively accurate data support for the evaluation and selection of project team members. 展开更多
关键词 Cloud computing knowledge management tacit knowledge reciprocal preference
在线阅读 下载PDF
Research on the Design and Education of Serious Network Security Games
2
作者 Keyong Wang Pei Wang +1 位作者 Yuanheng Zhang Dequan Yang 《国际计算机前沿大会会议论文集》 2022年第2期78-91,共14页
Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct s... Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct social behavior and value idea.Furthermore,through rule design and role play,students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies.This paper defines the concept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security.The purpose of this paper is to strengthen overall network security awareness,cultivate professional skills,and enhance network security. 展开更多
关键词 Serious game Network security Teaching technique
原文传递
A Machine Learning-Based Botnet Malicious Domain Detection Technique for New Business
3
作者 Aohan Mei Zekun Chen +1 位作者 Jing Zhao Dequan Yang 《国际计算机前沿大会会议论文集》 EI 2023年第2期191-201,共11页
In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receiv... In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receive commands from the botmaster,carrying out further attack activities.Therefore,a system based onmachine learning to dichotomizeDNSdomain access is designed,which can instantly detectDGAdomain names and thus quickly dispose of infected computers to avoid spreading the virus and further damage.In the comparison,the bidirectional LSTM model slightly outperformed the unidirectional LSTM network and achieved 99%accuracy in the open dataset classification task. 展开更多
关键词 BOTNET Machine Learning LSTM Domain Generation Algorithm Detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部