Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management.Existing research focuses on the constr...Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management.Existing research focuses on the construction of knowledge management systems and knowledge sharing and transfer mechanisms.With the rapid development and application of cloud computing and big data technology,knowledge management is faced with many problems,such as how to combine with the new generation of information technology,how to achieve integration with organizational business processes,and so on.To solve such problems,this paper proposes a reciprocal collaborative knowledge management model(RCKMmodel)based on cloud computing technology,reciprocity theory,and collaboration technology.RCKM model includes project group management and cloud computing technology,which can realize management,finance,communication,and quality assurance of multiple projects and solve the problem of business integration with knowledge management.This paper designs evaluation methods of tacit knowledge and reciprocity preference based on the Bayesian formula and analyzes their effect with simulation data.The methods can provide quantitative support for the integration of knowledge management and business management to realize reciprocity and collaboration in the RCKM model.The research found that RCKM model can fully use cloud computing technology to promote the integration of knowledge management and organizational business,and the evaluation method based on the Bayesian formula can provide relatively accurate data support for the evaluation and selection of project team members.展开更多
Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct s...Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct social behavior and value idea.Furthermore,through rule design and role play,students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies.This paper defines the concept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security.The purpose of this paper is to strengthen overall network security awareness,cultivate professional skills,and enhance network security.展开更多
In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receiv...In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receive commands from the botmaster,carrying out further attack activities.Therefore,a system based onmachine learning to dichotomizeDNSdomain access is designed,which can instantly detectDGAdomain names and thus quickly dispose of infected computers to avoid spreading the virus and further damage.In the comparison,the bidirectional LSTM model slightly outperformed the unidirectional LSTM network and achieved 99%accuracy in the open dataset classification task.展开更多
基金supported by the research project of the Jiangsu water conservancy science and technology project (Contract Number:2021067).
文摘Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management.Existing research focuses on the construction of knowledge management systems and knowledge sharing and transfer mechanisms.With the rapid development and application of cloud computing and big data technology,knowledge management is faced with many problems,such as how to combine with the new generation of information technology,how to achieve integration with organizational business processes,and so on.To solve such problems,this paper proposes a reciprocal collaborative knowledge management model(RCKMmodel)based on cloud computing technology,reciprocity theory,and collaboration technology.RCKM model includes project group management and cloud computing technology,which can realize management,finance,communication,and quality assurance of multiple projects and solve the problem of business integration with knowledge management.This paper designs evaluation methods of tacit knowledge and reciprocity preference based on the Bayesian formula and analyzes their effect with simulation data.The methods can provide quantitative support for the integration of knowledge management and business management to realize reciprocity and collaboration in the RCKM model.The research found that RCKM model can fully use cloud computing technology to promote the integration of knowledge management and organizational business,and the evaluation method based on the Bayesian formula can provide relatively accurate data support for the evaluation and selection of project team members.
基金Supported by Hainan Provincial National Science Foundation of China,621MS0789.
文摘Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct social behavior and value idea.Furthermore,through rule design and role play,students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies.This paper defines the concept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security.The purpose of this paper is to strengthen overall network security awareness,cultivate professional skills,and enhance network security.
基金Supported by Hainan Provincial National Science Foundation of China,621MS0789.
文摘In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receive commands from the botmaster,carrying out further attack activities.Therefore,a system based onmachine learning to dichotomizeDNSdomain access is designed,which can instantly detectDGAdomain names and thus quickly dispose of infected computers to avoid spreading the virus and further damage.In the comparison,the bidirectional LSTM model slightly outperformed the unidirectional LSTM network and achieved 99%accuracy in the open dataset classification task.