期刊文献+
共找到155篇文章
< 1 2 8 >
每页显示 20 50 100
Max-Min Security Rate Optimization in STAR-RIS Aided Secure MIMO Systems
1
作者 HUANG Jinhao MIAO Ling +1 位作者 SUO Long ZHOU Wen 《电讯技术》 北大核心 2025年第10期1657-1664,共8页
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu... The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems. 展开更多
关键词 multiple-input multiple-output(MIMO) reflecting reconfigurable intelligent surface(STAR-RIS) particle swarm optimization(PSO) max-min security rate optimization
在线阅读 下载PDF
武汉大学科研成果被USENIX Security 2025录用
2
作者 《信息网络安全》 北大核心 2025年第8期1327-1327,共1页
近日,武汉大学国家网络安全学院2023级硕士研究生闫楠作为第一作者撰写的论文被第34届USENIX安全研讨会(The34th USENIX Security Symposium 2025)录用。论文题目为“Embed X:Embedding-Based Cross-Trigger Backdoor Attack Against La... 近日,武汉大学国家网络安全学院2023级硕士研究生闫楠作为第一作者撰写的论文被第34届USENIX安全研讨会(The34th USENIX Security Symposium 2025)录用。论文题目为“Embed X:Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models”(《Embed X:基于嵌入的跨触发器大语言模型后门攻击》),指导老师为国家网络安全学院副研究员李雨晴(通信作者)、教授陈晶(通信作者)、副教授何琨。华中科技大学副教授王雄、香港科技大学教授李波参与合作。 展开更多
关键词 闫楠 USENIX security 2025
在线阅读 下载PDF
北京邮电大学网络空间安全学院本科生在USENIX Security Symposium发表两篇学术论文
3
《信息网络安全》 北大核心 2025年第3期508-508,共1页
近日,北京邮电大学网络空间安全学院郝杰副教授、杨义先教授团队两项研究成果被第34届USENIX Security Symposium (USENIX Security 2025)全文接收,2篇论文的第一作者分别为网络空间安全学院2021级本科生张志胜和2022级本科生金伟飞。US... 近日,北京邮电大学网络空间安全学院郝杰副教授、杨义先教授团队两项研究成果被第34届USENIX Security Symposium (USENIX Security 2025)全文接收,2篇论文的第一作者分别为网络空间安全学院2021级本科生张志胜和2022级本科生金伟飞。USENIX Security为CCF A类会议,与IEEE S&P、ACM CCS及NDSS并称为网络与信息安全领域四大国际学术会议,代表着国际网络与信息安全研究的前沿水平。 展开更多
关键词 本科生 USENIX security Symposium
在线阅读 下载PDF
东南大学李松泽团队成果被安全领域国际会议USENIX Security 2025录用
4
《信息网络安全》 北大核心 2025年第3期507-507,共1页
近日,东南大学网络空间安全学院李松泽教授团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用。论文第一作者为2022级博士研究生常益嘉(香港科技大学(广州))。李松泽教授为论文通信作者。论文题目是... 近日,东南大学网络空间安全学院李松泽教授团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用。论文第一作者为2022级博士研究生常益嘉(香港科技大学(广州))。李松泽教授为论文通信作者。论文题目是“Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity”。 展开更多
关键词 USENIX security 2025 东南大学
在线阅读 下载PDF
哈尔滨工业大学詹东阳团队研究成果被USENIX Security 2025录用
5
《信息网络安全》 北大核心 2025年第7期1174-1174,共1页
近日,哈尔滨工业大学网络空间安全学院副教授詹东阳团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用,该研究成果揭示了Web Assembly运行时资源隔离机制的安全缺陷,通过静态分析技术系统化探索了新... 近日,哈尔滨工业大学网络空间安全学院副教授詹东阳团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用,该研究成果揭示了Web Assembly运行时资源隔离机制的安全缺陷,通过静态分析技术系统化探索了新型资源耗尽的攻击面以及攻击策略,并探讨了可能的防护方案。 展开更多
关键词 哈尔滨工业大学 USENIX security 2025
在线阅读 下载PDF
Apache Axis1.1环境下WS-Security的研究与实现 被引量:4
6
作者 景建笃 《计算机工程与设计》 CSCD 北大核心 2005年第7期1925-1927,1964,共4页
SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基... SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基于WS-Security的安全模型,分析了ApacheAxis的消息处理机制,研究了此模型在ApacheAxis下的实现。 展开更多
关键词 Web服务 WS—security SOAP AXIS XML加密 XML签名
在线阅读 下载PDF
基于WS-Security规范的安全Web服务性能评估 被引量:1
7
作者 段友祥 包永堂 《小型微型计算机系统》 CSCD 北大核心 2009年第12期2364-2368,共5页
为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范... 为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范对Web服务响应时间和空间性能的影响,从而为Web服务在安全和性能两方面如何选择提供真实依据,对Web服务安全研究具有重要意义. 展开更多
关键词 WS—security WEB服务 性能评估 时间响应模型
在线阅读 下载PDF
使用Spring Security开发安全的Java程序 被引量:2
8
作者 梁云娟 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第4期148-150,共3页
介绍使用Spring Security开发Java安全应用程序的一种开发方式.Spring Security是目前用于替换Acegi的框架,配置简单,提高了开发者的生产力,并提供了一系列新功能.将详细介绍使用Spring Security开发一个完整示例,体会相比较Acegi带来... 介绍使用Spring Security开发Java安全应用程序的一种开发方式.Spring Security是目前用于替换Acegi的框架,配置简单,提高了开发者的生产力,并提供了一系列新功能.将详细介绍使用Spring Security开发一个完整示例,体会相比较Acegi带来的好处. 展开更多
关键词 SPRING security 安全 ACEGI
在线阅读 下载PDF
CALL FOR PAPERS Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06)
9
《复杂系统与复杂性科学》 EI CSCD 2005年第1期84-86,共3页
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as... Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region. 展开更多
关键词 security in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining CALL FOR PAPERS Workshop on Intelligence and security Informatics ASIA
在线阅读 下载PDF
Energy Security and Climate Change in the European Union,China and Latin American Relationships:Major Challenges and Areas of International Cooperation
10
作者 Maria Cristina Silva Parejas 《国际展望》 2009年第1期199-216,126,共19页
The author discusses the subject in both ecological and political perspectives based on a most comprehensive,authoritative and updated bibliography.Hence,Latin America and the Caribbean(LAC) is as much diversified as ... The author discusses the subject in both ecological and political perspectives based on a most comprehensive,authoritative and updated bibliography.Hence,Latin America and the Caribbean(LAC) is as much diversified as there are sub-regions and regional organizations in geopolitical and geo-economical terms and often dialectic regarding energy security,climate change and LAC ties with Europeans and China and so is the tripartite relations with the rest of the world so far as energy security and climate cha... 展开更多
关键词 In Energy security and Climate Change in the European Union China and Latin American Relationships LAC security
在线阅读 下载PDF
Security transmission and recognition of F-knowledge 被引量:7
11
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 S-rough sets F-knowledge security of knowledge RSA algorithm recognition criterion application.
在线阅读 下载PDF
Adaptive link layer security architecture for telecommand communications in space networks 被引量:3
12
作者 Lei Zhang Chengjin An +1 位作者 Susanna Spinsante Chaojing Tang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第3期357-372,共16页
Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links am... Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission. 展开更多
关键词 space network telecommand security adaptive estimate performance optimization misbehavior detection.
在线阅读 下载PDF
Hybrid rice technology for food security in the world 被引量:12
13
作者 YUAN Long-ping(China National Hybrid Rice R & D Center,Changsha,Hunan,410125,China) 《作物研究》 2004年第4期185-186,共2页
关键词 Hybrid rice technology for food security in the world LINE
在线阅读 下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
14
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationshi... Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
15
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
Cloud edge integrated security architecture of new cloud manufacturing system 被引量:1
16
作者 ZHAO Longbo LI Bohu YUAN Haitao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1177-1189,共13页
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre... With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations. 展开更多
关键词 new cloud manufacturing system(NCMS) integrated cloud-edge-terminal security system architecture zero trust
在线阅读 下载PDF
梅特勒-托利多倾力之作GWP——全球称量应用指南隆重登场——Maximize Process Security & Minimize Costs
17
《化工学报》 EI CAS CSCD 北大核心 2008年第10期2655-2655,共1页
关键词 security 指南 应用 GWP 中国市场
在线阅读 下载PDF
Trump’s “America First” Security Strategy: Impact on China-US Relations
18
作者 Teng Jianqun 《国际问题研究》 CSSCI 北大核心 2018年第3期244-259,共16页
关键词 Trump's "America First" security STRATEGY IMPACT on China-US RELATIONS
在线阅读 下载PDF
A fault injection model-oriented testing strategy for component security
19
作者 陈锦富 卢炎生 +1 位作者 张卫 谢晓东 《Journal of Central South University》 SCIE EI CAS 2009年第2期258-264,共7页
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje... A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components. 展开更多
关键词 component testing component security fault injection model testing strategy detecting algorithm
在线阅读 下载PDF
Research on Power System Security and Stability Standards
20
作者 SHU Yinbiao TANG Yong SUN Huadong 《中国电机工程学报》 EI CSCD 北大核心 2013年第25期I0001-I0026,共26页
Power system security and stability is very important to national economy and people's life,so it has been paid great attention by governments and power utilities.In order to avoid huge economic losses caused by l... Power system security and stability is very important to national economy and people's life,so it has been paid great attention by governments and power utilities.In order to avoid huge economic losses caused by large-scale blackouts,State Grid Corporation of China(SGCC)have invested sufficient human and financial resources to carry out related researches,and remarkable achievements have been achieved.However,large grid stability problem is very complex,it is still difficult to completely avoid the blackouts. 展开更多
关键词 power system security and stability standards planning and design operational control generator-grid coordination simulation modelin
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部