期刊文献+
共找到63篇文章
< 1 2 4 >
每页显示 20 50 100
《CyberFish-Front 2.0》(局部)
1
作者 罗霄 《艺术学研究》 2025年第1期F0003-F0003,共1页
“CyberFish”是始于2021年的机器学习系列作品。《CyberFish-Front 2.0》作于2024年,在初代基础上使用StyleGAN训练和生成,引入Midjourney创建数据集,使所生成的鱼形态更加丰富细腻。
关键词 机器学习 CYBER 数据集 系列作品
在线阅读 下载PDF
Network Defense Decision-Making Based on Deep Reinforcement Learning and Dynamic Game Theory
2
作者 Huang Wanwei Yuan Bo +2 位作者 Wang Sunan Ding Yi Li Yuhua 《China Communications》 SCIE CSCD 2024年第9期262-275,共14页
Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the informat... Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the information opacity in practical attack and defense scenarios,and the model and method lack accuracy.To such problem,we investigate network defense policy methods under finite rationality constraints and propose network defense policy selection algorithm based on deep reinforcement learning.Based on graph theoretical methods,we transform the decision-making problem into a path optimization problem,and use a compression method based on service node to map the network state.On this basis,we improve the A3C algorithm and design the DefenseA3C defense policy selection algorithm with online learning capability.The experimental results show that the model and method proposed in this paper can stably converge to a better network state after training,which is faster and more stable than the original A3C algorithm.Compared with the existing typical approaches,Defense-A3C is verified its advancement. 展开更多
关键词 A3C cyber attack-defense analysis deep reinforcement learning stochastic game theory
在线阅读 下载PDF
国际动态
3
《中国信息安全》 2024年第6期10-11,共2页
美国美国家网络总监办公室发布《网络安全态势报告》5月7日,美国CyberScoop网站消息,美国国家网络总监办公室(ONCD)发布《网络安全态势报告》。该报告总结了2023年网络安全挑战及应对情况,重点关注人工智能和云迁移的影响,分析了美国网... 美国美国家网络总监办公室发布《网络安全态势报告》5月7日,美国CyberScoop网站消息,美国国家网络总监办公室(ONCD)发布《网络安全态势报告》。该报告总结了2023年网络安全挑战及应对情况,重点关注人工智能和云迁移的影响,分析了美国网络安全态势并评估了美国网络安全政策和战略的有效性。报告认为,网络和技术领域的“根本性变革”推动了安全形势变化,加剧了关键基础设施、勒索软件. 展开更多
关键词 网络安全态势 人工智能 勒索软件 关键基础设施 网络安全政策 安全形势 CYBER 云迁移
在线阅读 下载PDF
一种可扩展的Cyber空间作战体系描述模型 被引量:5
4
作者 邓志宏 老松杨 +1 位作者 白亮 杨征 《国防科技大学学报》 EI CAS CSCD 北大核心 2014年第1期184-190,共7页
研究了Cyber空间作战体系模型构建技术,提出一种面向Cyber空间作战模拟的战争系统建模新思路,并以此为基础提出了Cyber空间作战体系一体化逻辑网络模型。将Cyber空间作战涉及到的敌我双方作战实体视为一个整体系统的组分,抽象为网络模... 研究了Cyber空间作战体系模型构建技术,提出一种面向Cyber空间作战模拟的战争系统建模新思路,并以此为基础提出了Cyber空间作战体系一体化逻辑网络模型。将Cyber空间作战涉及到的敌我双方作战实体视为一个整体系统的组分,抽象为网络模型的实体节点,实体间的各种合作、协同、对抗等不同类型交互行为统一抽象为网络模型的逻辑边。针对网络模型的节点和边分别建立了基于本体的实体描述模型和基于OO-LAMBDA语言的行为描述模型。通过一个真实战例的仿真实验验证了本文提出的方法的有效性和正确性。 展开更多
关键词 Cyber空间 Cyber空间作战体系 描述模型
在线阅读 下载PDF
基于多变元网络的Cyber作战建模方法 被引量:1
5
作者 邓志宏 老松杨 白亮 《火力与指挥控制》 CSCD 北大核心 2013年第6期63-67,共5页
Cyberspace是近年出现的一个新概念,分析了Cyberspace的概念及特性,提出Cyberspace层次概念模型,在此基础上,提出基于多变元网络的Cyber作战建模方法,认为Cyber作战建模可以分为对战争系统静态结构建模和交战行为动态交互建模,并对应分... Cyberspace是近年出现的一个新概念,分析了Cyberspace的概念及特性,提出Cyberspace层次概念模型,在此基础上,提出基于多变元网络的Cyber作战建模方法,认为Cyber作战建模可以分为对战争系统静态结构建模和交战行为动态交互建模,并对应分别建立了Cyberspace战争系统的多变元网络模型和Cyber作战交战行为的多变元网络演化模型,最后运用所建立的模型对一个典型Cyber战进行了分析。 展开更多
关键词 CYBERSPACE Cyber作战 作战建模 多变元网络 网络演化
在线阅读 下载PDF
《塔林手册2.0版》:影响与启示 被引量:11
6
作者 黄志雄 《中国信息安全》 2018年第3期84-87,共4页
2017年2月,由北约智库“网络合作防御卓越中心”发起完成的《网络行动国际法塔林手册2.0版》(Tallinn Manual 2.0 on the International Law Applicableto Cyber Operations)(简称《塔林手册2.0版》)由英国剑桥大学出版社正式出版.... 2017年2月,由北约智库“网络合作防御卓越中心”发起完成的《网络行动国际法塔林手册2.0版》(Tallinn Manual 2.0 on the International Law Applicableto Cyber Operations)(简称《塔林手册2.0版》)由英国剑桥大学出版社正式出版.《塔林手册2.0版》是一个在西方国家主导下,试图通过学者的集体研究来推动网络空间国际法发展的大型项目,也是网络空间国际博弈中有一定影响的机制之一.在《塔林手册2.0版》推出一周年之际,重温该手册的出台历程,思考它对网络空间国际规则的影响,总结其带来的启示和影响,对我国准确把握网络空间国际法的发展态势、积极参与网络空间国际规则制定有着重要意义. 展开更多
关键词 手册 网络空间 英国剑桥大学 网络合作 国际规则 CYBER 国际法
在线阅读 下载PDF
On Cyber Chatting Language in China
7
作者 陈金 卡力贝努尔.木台力甫 《海外英语》 2012年第20期223-224,232,共3页
Chatting language is a unique phenomenon confined to the Internet.It is of great interest to a great number of re searchers.This paper is going to make a research in the following aspects:categories of cyber chatting ... Chatting language is a unique phenomenon confined to the Internet.It is of great interest to a great number of re searchers.This paper is going to make a research in the following aspects:categories of cyber chatting language in China and its distinguishing features.By doing so,it is hoped that more and more people can be aware of the use of online chatting language and use it on proper occasions. 展开更多
关键词 CYBER CHATTING LANGUAGE CATEGORIES FEATURES
在线阅读 下载PDF
关于cyber-词语的翻译
8
作者 田传茂 《英语知识》 2005年第2期37-38,共2页
近年来,随着计算机网络的迅猛发展和普及,出现了许多与计算机和网络相关的概念和事物,cyber-成为一个空前活跃的英语前缀。笔者以为,就cyber-及其相关词语的翻译进行规范,对不断涌现的cyber-新词的翻译十分重要。
关键词 CYBER 词语 翻译 科技英语
在线阅读 下载PDF
“Cyberspace” or “Cyber warfare”研究热点与趋势分析 被引量:1
9
作者 郑涛 李自力 +2 位作者 赵小强 郝烺超 谭跃进 《现代情报》 CSSCI 2013年第11期119-130,共12页
运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿... 运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。 展开更多
关键词 CitespaceⅡ CYBERSPACE CYBER warfare 网络空间 网络战 赛博空间 赛博战 研究热点 研究趋势
在线阅读 下载PDF
立体定向放射神经外科机器人CYBER刀系统治疗垂体瘤的效果 被引量:1
10
作者 韦鹏翔 张红波 汪延明 《中国医药导报》 CAS 2019年第11期62-64,共3页
目的探讨立体定向放射神经外科(SRNS)机器人CYBER刀系统治疗垂体瘤的治疗途径,为垂体腺瘤的治疗开辟无创治疗新路。方法选取2015年5月~2018年12月解放军960医院及山东省医学科学院附属医院收治的垂体瘤患者12例,应用美国第五代无创机... 目的探讨立体定向放射神经外科(SRNS)机器人CYBER刀系统治疗垂体瘤的治疗途径,为垂体腺瘤的治疗开辟无创治疗新路。方法选取2015年5月~2018年12月解放军960医院及山东省医学科学院附属医院收治的垂体瘤患者12例,应用美国第五代无创机器人赛博刀(CYBERKNIFE)系统治疗,采用126个放射节点,分3次治疗,每次间隔24 h,三次总剂量20 Gy;肿瘤边缘视神经剂量20 Gy,结合临床症状及内分泌变化,分析CYBERKNIFE治疗垂体腺瘤的效果。结果泌乳素(PRL)肿瘤6例,生长激素(GH)肿瘤6例;肿瘤直径2.0~3.5 cm,平均(2.30±0.78)cm。术前4例PRL显著升高>200 ng/L,平均(390.00±45.32)ng/L,2例增高37.5~68.6 ng/L,平均(46.00±17.69)ng/L,6例GH升高,平均(14.00±9.13)ng/L。治疗2周后复查MRT2显示肿瘤放射性坏死;术后复查4例激素完全恢复正常,神经内分泌紊乱8例,其中6例恢复正常,轻度下降1例,无改善1例;术后随访3~11个月,平均5.8个月,内分泌功能低下1例,口服强的松及甲状腺素替代治疗。复发1例手术治疗。无永久性尿崩及手术死亡病例。结论应用立体定向无框架放射神经外科CYBER刀系统,以20 Gy损毁剂量,100节点以上分次治疗垂体瘤安全可行。 展开更多
关键词 垂体瘤 CYBER刀 治疗
在线阅读 下载PDF
Influential Node Ranking and Invulnerability of Air Traffic Cyber Physical System 被引量:6
11
作者 WANG Xinglong HE Min 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期288-297,共10页
To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical couplin... To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS. 展开更多
关键词 complex network air traffic cyber physical system improved K-shell algorithm influential node ranking INVULNERABILITY
在线阅读 下载PDF
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 被引量:4
12
作者 Ming Wan Jiawei Li +2 位作者 Ying Liu Jianming Zhao Jiushuang Wang 《China Communications》 SCIE CSCD 2021年第1期130-150,共21页
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ... Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a significant topic because current networked control systems are supporting various critical infrastructures to offer vital utility services.By comparing with traditional IT systems,this paper first analyzes the uncontrollable cyber threats and classified attack characteristics,and elaborates the intrinsic vulnerabilities in current networked control systems and novel security challenges in future Industrial Internet.After that,in order to overcome partial vulnerabilities,this paper presents a few representative security mechanisms which have been successfully applied in today’s industrial control systems,and these mechanisms originally improve traditional IT defense technologies from the perspective of industrial availability.Finally,several popular security viewpoints,adequately covering the needs of industrial network structures and service characteristics,are proposed to combine with burgeoning industrial information technologies.We target to provide some helpful security guidelines for both academia and industry,and hope that our insights can further promote in-depth development of industrial cyber security. 展开更多
关键词 industrial cyber threats industrial characteristics VULNERABILITIES security mechanisms and viewpoints
在线阅读 下载PDF
基于Cyber Kill Chain的铁路信息网络安全防御研究 被引量:5
13
作者 杨钰杰 霍云龙 《铁路计算机应用》 2021年第11期64-67,共4页
为有效应对铁路企业面临的日益严峻的信息网络安全威胁,引入Cyber Kill Chain模型来识别和预防网络入侵活动,分析了该模型7个阶段相应的攻击行为特点,针对各阶段的预期目的,提出符合铁路行业特点的信息网络安全防御措施,以求在网络攻击... 为有效应对铁路企业面临的日益严峻的信息网络安全威胁,引入Cyber Kill Chain模型来识别和预防网络入侵活动,分析了该模型7个阶段相应的攻击行为特点,针对各阶段的预期目的,提出符合铁路行业特点的信息网络安全防御措施,以求在网络攻击较早阶段瓦解网络威胁,构建全方位、深层次的网络安全防御体系,保护铁路基础设施、应用系统、数据资源等免遭网络攻击破坏。 展开更多
关键词 网络安全 Cyber Kill Chain 安全防御 威胁分析 安全检测
在线阅读 下载PDF
MimicCloudSim:An Environment for Modeling and Simulation of Mimic Cloud Service 被引量:2
14
作者 Liming Pu Jiangxing Wu +2 位作者 Hailong Ma Yuhang Zhu Yingle Li 《China Communications》 SCIE CSCD 2021年第1期212-221,共10页
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha... In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable. 展开更多
关键词 cyber mimic defense mimic cloud service SIMULATION dynamic heterogeneous redundancy
在线阅读 下载PDF
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations 被引量:1
15
作者 C.Maathuis W.Pieters J.van den Berg 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第2期352-374,共23页
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s... Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article. 展开更多
关键词 Cyber operations Cyber warfare Cyber weapons Artificial intelligence Fuzzy logic TARGETING
在线阅读 下载PDF
A quantitative analysis model of grid cyber physical systems 被引量:6
16
作者 Li Huang Yun Liang +1 位作者 Feng Huang Dayang Wang 《Global Energy Interconnection》 2018年第5期618-626,共9页
Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analys... Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security. 展开更多
关键词 CYBER PHYSICAL systems QUANTITATIVE analysis algorithm BIPARTITE network SMART GRID
在线阅读 下载PDF
Semantic Social Service Organization Mechanism in Cyber Physical System 被引量:1
17
作者 张波 潘晓声 潘建国 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2014年第4期452-462,共11页
Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve servi... Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism. 展开更多
关键词 cyber physical system(CPS) self-organizing mechanism SEMANTIC environment-aware measurement service capacity evaluation
在线阅读 下载PDF
Toward Energy-Efficient and Trustworthy eHealth Monitoring System 被引量:1
18
作者 Ajmal Sawand Soufiene Djahel +1 位作者 Zonghua Zhang Farid Na?t-Abdesselam 《China Communications》 SCIE CSCD 2015年第1期46-65,共20页
The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant p... The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions. 展开更多
关键词 eHealthcare wireless body area networks cyber physical systems mobile crowd sensing security privacy by design trust.
在线阅读 下载PDF
地铁车站BAS网络化系统的通信研究
19
作者 周长根 陈志新 +1 位作者 王佳 张雷 《北京建筑工程学院学报》 2010年第3期61-65,共5页
地铁车站中BAS是轨道交通的基础和核心.BAS网络结构的优劣直接影响着车站工作站、OCC、TCC等多级监控端的性能.针对当前BAS存在的现场信息传输延迟、控制信息响应较慢等问题,采用Cyber系列软件和CSC800型PLC搭建了车站BAS的网络结构并... 地铁车站中BAS是轨道交通的基础和核心.BAS网络结构的优劣直接影响着车站工作站、OCC、TCC等多级监控端的性能.针对当前BAS存在的现场信息传输延迟、控制信息响应较慢等问题,采用Cyber系列软件和CSC800型PLC搭建了车站BAS的网络结构并进行了详细分析,在实现BAS网络实时通信的基础上,提高了网络利用率和信息传输速度,为车站BAS的网络结构和通信的进一步研究奠定了基础. 展开更多
关键词 BAS 网络结构 PLC CYBER 通信
在线阅读 下载PDF
英国网络安全意识教育主要做法及启示 被引量:2
20
作者 陈伟 《中国信息安全》 2022年第1期54-57,共4页
英国于2021年12月和2022年1月接连发布《2022年国家网络战略》(National Cyber Strategy 2022)和《2022-2030年国家网络安全战略》(Government Cyber Security Strategy2022-2030),分析英国当前面临的网络安全风险,强调确保网络安全对... 英国于2021年12月和2022年1月接连发布《2022年国家网络战略》(National Cyber Strategy 2022)和《2022-2030年国家网络安全战略》(Government Cyber Security Strategy2022-2030),分析英国当前面临的网络安全风险,强调确保网络安全对其国家安全和发展的意义,提出构建网络生态应对持续变化的一系列举措,并把网络安全意识提高到文化的高度,对网络安全意识教育工作提出了更高要求。 展开更多
关键词 网络安全意识 网络安全风险 国家网络安全战略 Strategy Security CYBER 构建网络 更高要求
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部