期刊文献+
共找到3,730篇文章
< 1 2 187 >
每页显示 20 50 100
从网络安全改变战争形式说起 预览
1
作者 史学玲 《仪器仪表标准化与计量》 2019年第3期3-6,共4页
网络攻击的最高级别是网络战争。关键基础设施的网络安全防护必须依靠国家的国防、武装力量,利用军队、警察去保卫,然后才是工厂级的保护。工业类关键基础设施必须建立以功能安全为核心的安全一体化防护体系。机械工业行业需要担负责任。
关键词 网络安全 信息安全 功能安全 关键基础设施 安全一体化
在线阅读 下载PDF
Distribution system state estimation: an overview of recent developments
2
作者 Gang WANG Georgios B.GIANNAKIS +1 位作者 Jie CHEN Jian SUN 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2019年第1期4-17,共14页
In the envisioned smart grid, high penetration of uncertain renewables, unpredictable participation of(industrial) customers, and purposeful manipulation of smart meter readings, all highlight the need for accurate,fa... In the envisioned smart grid, high penetration of uncertain renewables, unpredictable participation of(industrial) customers, and purposeful manipulation of smart meter readings, all highlight the need for accurate,fast, and robust power system state estimation(PSSE). Nonetheless, most real-time data available in the current and upcoming transmission/distribution systems are nonlinear in power system states(i.e., nodal voltage phasors).Scalable approaches to dealing with PSSE tasks undergo a paradigm shift toward addressing the unique modeling and computational challenges associated with those nonlinear measurements. In this study, we provide a contemporary overview of PSSE and describe the current state of the art in the nonlinear weighted least-squares and least-absolutevalue PSSE. To benchmark the performance of unbiased estimators, the Cramér-Rao lower bound is developed.Accounting for cyber attacks, new corruption models are introduced, and robust PSSE approaches are outlined as well. Finally, distribution system state estimation is discussed along with its current challenges. Simulation tests corroborate the effectiveness of the developed algorithms as well as the practical merits of the theory. 展开更多
关键词 State estimation Cramér-Rao bound Feasible point PURSUIT SEMIDEFINITE relaxation PROXIMAL linear algorithm Composite optimization CYBER attack BAD data detection
Bullying Among School Students in the UAE Society 预览
3
作者 Ahmad Falah Alomosh Salama Mohammad Alrahoomi +1 位作者 Moudi Mohamed Hamad Alshamsi Omaima Daham Shaban Alani 《心理学研究:英文版》 2019年第2期45-56,共12页
The purpose of this study is to research the bullying phenomenon among school students in the UAE society. This is done through showing the extent of prevalence of bullying, the rate of recurrence of bullying incidenc... The purpose of this study is to research the bullying phenomenon among school students in the UAE society. This is done through showing the extent of prevalence of bullying, the rate of recurrence of bullying incidences, the most widespread forms of bullying among school children in the Emirati society, and finally, the variation with regards to the prevalence and forms of bullying as related to the student’s gender. Therefore, this study aims to probe the prevalence of this phenomenon in schools, and the frequency of bullying cases as well as its forms. For this purpose, a questionnaire was designed and conducted on a sample size of 1,309 students of both genders. The data were later analyzed using descriptive statistical and analytical metrics that are appropriate for the variables’ measurement level, and which achieve the objectives of the study. The study found that a third of the students (33.3%) were involved in bullying incidents. Furthermore, it was found that 14.2% were the party causing the bullying incident, while 19.1% were the party upon which bullying was inflicted. The study also revealed that within school premises the places where bullying was most likely to occur are corridors, and the places which students felt were the least safe are the closed spaces. As for the forms of bullying students are subjected to, offensive name calling or insults came in first place, followed by cyber/online bullying. The young age and smaller size of a student were among the most important motivators for students to bully him/her. It was also found that 32.8% of students who are exposed to bullying respond in a similar manner. The study showed that most of the bullied students (78.4%) know the person doing the bullying, the females being more cognizant of the perpetrator bullying them. Moreover, 40.7% of the students believe that the teachers and other employees are aware of the bullying taking place, female students to a greater extent than males in this regard. In the study sample, the students believe that s 展开更多
关键词 UAE SOCIETY BULLYING CYBER BULLYING offensive NAMES school ADMINISTRATION
在线阅读 下载PDF
对未来国际科技发展的分析与预测 预览
4
作者 刘艺 崔越 谢金兴 《信息安全研究》 2019年第7期592-598,共7页
主要聚焦未来30年内,在全球化的大环境下,可能影响国家力量的计算机与网络核心科技,并希望以此来帮助国家理解新兴技术趋势,应对未来不确定性.众所周知,精细地预测未来会发生的事是不可能的,目的是告知国家未来可能的发展方向,并确定发... 主要聚焦未来30年内,在全球化的大环境下,可能影响国家力量的计算机与网络核心科技,并希望以此来帮助国家理解新兴技术趋势,应对未来不确定性.众所周知,精细地预测未来会发生的事是不可能的,目的是告知国家未来可能的发展方向,并确定发展战略,以最好的姿态面对未来.在未来30年内,科学技术会是驱动世界改变的核心力量.主要介绍机器人与自动化、物联网和网络方面的关键技术,并结合国内外分析机构对这些技术的评论,分析这些技术的潜在影响. 展开更多
关键词 趋势 新兴技术 机器人与自动化 物联网 网络 影响
在线阅读 下载PDF
Communication Scheduling and Remote Estimation With Adversarial Intervention 预览
5
作者 Xiaobin Gao Emrah Akyol Tamer Basar 《自动化学报:英文版》 CSCD 2019年第1期32-44,共13页
We study a communication scheduling and remote estimation problem within a worst-case scenario that involves a strategic adversary. Specially, a remote sensing system consisting of a sensor, an encoder and a decoder i... We study a communication scheduling and remote estimation problem within a worst-case scenario that involves a strategic adversary. Specially, a remote sensing system consisting of a sensor, an encoder and a decoder is configured to observe,transmit, and recover a discrete time stochastic process. At each time step, the sensor makes an observation on the state variable of the stochastic process. The sensor is constrained by the number of transmissions over the time horizon, and thus it needs to decide whether to transmit its observation or not after making each measurement. If the sensor decides to transmit,it sends the observation to the encoder, who then encodes and transmits the observation to the decoder. Otherwise, the sensor and the encoder maintain silence. The decoder is required to generate a real-time estimate on the state variable. The sensor,the encoder, and the decoder collaborate to minimize the sum of the communication cost for the sensor, the encoding cost for the encoder, and the estimation error for the decoder. There is also a jammer interfering with the communication between the encoder and the decoder, by injecting an additive channel noise to the communication channel. The jammer is charged for the jamming power and is rewarded for the estimation error generated by the decoder, and it aims to minimize its net cost. We consider a feedback Stackelberg game with the sensor, the encoder, and the decoder as the composite leader, and the jammer as the follower. Under some technical assumptions, we obtain a feedback Stackelberg solution, which is threshold based for the scheduler,and piecewise affine for the encoder and the decoder. We also generate numerical results to demonstrate the performance of the remote sensing system under the feedback Stackelberg solution. 展开更多
关键词 CYBER physical security ESTIMATION GAME theory SENSOR networks
在线阅读 下载PDF
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing 预览
6
作者 Xu Cheng Fulong Chen +3 位作者 Dong Xie Hui Sun Cheng Huang Zhuyun Qi 《国际计算机前沿大会会议论文集》 2019年第1期409-411,共3页
Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted thi... Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process. A network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, data was ensured not to be tampered and trackable. The security threat was eliminated by bilinear mapping in the authentication process of medical data providers and users. The credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain node. The security analysis and performance test were carried out to verify the security and related performance of the authentication protocol. The results show that the MCPS based on blockchain realizes medical treatment data sharing, and meets safety requirements in the security authentication phase. 展开更多
关键词 CYBER Physical Systems Data SECURITY SHARING Blockchain DECENTRALIZATION feature SECURITY AUTHENTICATION
在线阅读 下载PDF
倍耐力为车队打造的CYBER FLEET SMART和CYBER FLEET GATE创新解决方案
7
作者 李瑞 《专用车与零部件》 2018年第5期36-37,共2页
此次升级后Cyber Fleet Smart和Cyber Fleet Gate可以通过蓝牙进行信息互换,并加快轮胎检测进程。倍耐力在第67届汉诺威国际商用车及零部件展(IAA)上,全新升级Cyber Fleet数字化车队监测和管理系统,推出2款最新车队解决方案Cyber Fleet ... 此次升级后Cyber Fleet Smart和Cyber Fleet Gate可以通过蓝牙进行信息互换,并加快轮胎检测进程。倍耐力在第67届汉诺威国际商用车及零部件展(IAA)上,全新升级Cyber Fleet数字化车队监测和管理系统,推出2款最新车队解决方案Cyber Fleet Smart和Cyber Fleet Gate,旨在优化管理成本,提高轮胎的安全性和使用效率,减少车辆的停工时间和二氧化碳排放。 展开更多
关键词 倍耐力 轮胎检测 CYBER FLEET GATE CYBER FLEET SMART
世界的三元化和新一代人工智能 预览 被引量:2
8
作者 潘云鹤 《现代城市》 2018年第1期1-3,共3页
近年来,随着信息力量的迅速壮大,信息空间(C)正成为世界空间的新一极,我们称之为从PH发展到CPH。世界的CPH空间已推动AI走向新一代,也正在推动形成一种新的城市发展方式及其研究方式。分析了AI走向2.0的原因,由来和走向。
关键词 人工智能(AI) 信息空间(C) 三元空间
在线阅读 下载PDF
约瑟夫·奈对软权力在信息和网络时代的讨论 预览 被引量:1
9
作者 石丽荣 《教育教学论坛》 2018年第12期112-113,共2页
约瑟夫·奈在1990年提出了“软权力”概念,指出权利包括硬权力和软权力。在全球化日益深化的时代背景下,软权力发挥着越来越重要的作用。互联网作为一种权利工具,是奈的软权力理论体系中的重要客体。奈关于网络软权力的讨论对网络... 约瑟夫·奈在1990年提出了“软权力”概念,指出权利包括硬权力和软权力。在全球化日益深化的时代背景下,软权力发挥着越来越重要的作用。互联网作为一种权利工具,是奈的软权力理论体系中的重要客体。奈关于网络软权力的讨论对网络强国建设具有一定的现实意义。 展开更多
关键词 软权力 网络 网络软权利
在线阅读 下载PDF
Cyber security meets artificial intelligence:a survey
10
作者 Jian-hua LI 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2018年第12期1462-1474,共13页
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence(AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct ... There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence(AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system. 展开更多
关键词 CYBER SECURITY Artificial INTELLIGENCE (AI) ATTACK detection DEFENSIVE techniques
Intelligent data attacks against power systems using incomplete network information: a review 预览
11
作者 Yufei SONG Xuan LIU +2 位作者 Zhiyi LI Mohammad SHAHIDEHPOUR Zuyi LI 《现代电力系统与清洁能源学报(英文)》 2018年第4期630-641,共12页
With the integration of information technologies, power system operations are increasingly threatened by cyber-attacks. It has even been revealed that an attacker can inject false data into real-time measurements stea... With the integration of information technologies, power system operations are increasingly threatened by cyber-attacks. It has even been revealed that an attacker can inject false data into real-time measurements stealthily without knowing the full configuration(e.g., network topology) of a power system. In this paper, we present a comprehensive review on false data injection attacks which utilize barrier conditions, blind identification techniques and data driven approaches to overcome limitations of incomplete network information. We also point out future research topics for facilitating the detection and prevention of such false data attacks. 展开更多
关键词 CYBER security False DATA injection ATTACK INCOMPLETE network information Power system state estimation
在线阅读 下载PDF
《塔林手册2.0版》:影响与启示 预览 被引量:3
12
作者 黄志雄 《中国信息安全》 2018年第3期84-87,共4页
2017年2月,由北约智库“网络合作防御卓越中心”发起完成的《网络行动国际法塔林手册2.0版》(Tallinn Manual 2.0 on the International Law Applicableto Cyber Operations)(简称《塔林手册2.0版》)由英国剑桥大学出版社正式出版.... 2017年2月,由北约智库“网络合作防御卓越中心”发起完成的《网络行动国际法塔林手册2.0版》(Tallinn Manual 2.0 on the International Law Applicableto Cyber Operations)(简称《塔林手册2.0版》)由英国剑桥大学出版社正式出版.《塔林手册2.0版》是一个在西方国家主导下,试图通过学者的集体研究来推动网络空间国际法发展的大型项目,也是网络空间国际博弈中有一定影响的机制之一.在《塔林手册2.0版》推出一周年之际,重温该手册的出台历程,思考它对网络空间国际规则的影响,总结其带来的启示和影响,对我国准确把握网络空间国际法的发展态势、积极参与网络空间国际规则制定有着重要意义. 展开更多
关键词 手册 网络空间 英国剑桥大学 网络合作 国际规则 CYBER 国际法
在线阅读 下载PDF
From Industry 4.0 to Research 4.0. Development of High Performance Fibers in the Light of Digitization 预览
13
作者 Steffen Müller-Probandt 《材料科学与工程:中英文B版》 2018年第4期161-177,共17页
We associate a variety of innovations with the term "Industry 4.0". The pioneer of many 4.0 modifications forms the basisfor the trend towards the integrated digitization of many areas of life. The field of research... We associate a variety of innovations with the term "Industry 4.0". The pioneer of many 4.0 modifications forms the basisfor the trend towards the integrated digitization of many areas of life. The field of research requires from the pilot plants to developnew pioneering fibers high flexibility of its experimental facilities to allow new insights in the laboratory and prototype facilities at areasonable cost. Added to this is the desire to closely track all process data and prepare it in a timely manner. Mobile devices nowallow the researcher to vary parameters close to the process during observation. In the following lecture the question will bediscussed which of the many definitions and varieties of "Industry 4.0" can be meaningfully transferred to the field of research. Indoing so, we are guided by the findings that have been gained with modularized spinning systems in recent years. The respectivespinning processes require different analysis focuses and different conversion options. The digital world must follow the realdemands of the analog world. In addition to the elegance functions, it must be ensured that the control functions of the process meetthe requirements of machine safety. Digitization allows intelligent analyzes to be developed independently of the various spinningprocesses and can be flexibly adapted to the respective process conditions. The variability of spin systems depends on the intelligentmodularization of individual functions and the physics that require the spinning conditions. Finally, some examples of modularprototype systems are presented, and the limits of variability are discussed. 展开更多
关键词 INDUSTRY 4.0 internet of things MODULARIZATION innovation RESEARCH prototype SPINNING machines high performancefibers carbon fibers CYBER physical production systems
在线阅读 下载PDF
澳大利亚e-Research环境与创新 预览
14
作者 张洋 陈文波 《中国教育网络》 2018年第7期35-37,共3页
e—Science,在美国被称为cyber—infrastructure,被定义成为共享计算资源、分布式数据库和科研协作交流数字平台三种不同发展的组合。它的核心思想是通过汇集人类专业知识、数据、资源、计算和可视化工具来提高知识的生产,也是一种... e—Science,在美国被称为cyber—infrastructure,被定义成为共享计算资源、分布式数据库和科研协作交流数字平台三种不同发展的组合。它的核心思想是通过汇集人类专业知识、数据、资源、计算和可视化工具来提高知识的生产,也是一种采用互联网络技术和广域分布式的高性能计算环境来建立的全新科学研究模式。 展开更多
关键词 计算环境 澳大利亚 分布式数据库 创新 科学研究模式 互联网络技术 专业知识 CYBER
在线阅读 下载PDF
个性化无外壳电机
15
作者 Christoph Weis Kay-Horst Dempewolf 《现代制造》 2018年第8期32-34,共3页
无外壳的CyberKit系列电机是Wittenstein Cyber Motor有限公司为不能靠轴驱动的伺服技术应用提供的一个解决方案,以各种不同的电机以及特殊的开发、制造和集成能力为基础,人们研发出了专用内置式电机,它们由高度专业化的小型制造厂... 无外壳的CyberKit系列电机是Wittenstein Cyber Motor有限公司为不能靠轴驱动的伺服技术应用提供的一个解决方案,以各种不同的电机以及特殊的开发、制造和集成能力为基础,人们研发出了专用内置式电机,它们由高度专业化的小型制造厂生产。 展开更多
关键词 电机 外壳 个性化 CYBER 伺服技术 集成能力 制造厂 内置式
A quantitative analysis model of grid cyber physical systems
16
作者 Li Huang Yun Liang +1 位作者 Feng Huang Dayang Wang 《全球能源互联网:英文版》 2018年第5期618-626,共9页
Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analys... Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security. 展开更多
关键词 CYBER PHYSICAL systems QUANTITATIVE analysis algorithm BIPARTITE network SMART GRID
数字工艺的未来方向是什么?——安索帕全球CEO林友琴谈数字工艺狮评审
17
作者 安索帕集团 《中国广告》 2018年第8期58-60,共3页
在刚刚落幕的2018戛纳国际创意节上,安索帕全球CEO林友琴(Jean Lin)作为Digital Craft Lions(数字工艺狮)评审团主席,负责为这一新设立的奖项树立评审标准,并带领评审团选出金银铜奖和全场大奖。这是她继2015年担任Cyber Lion(数... 在刚刚落幕的2018戛纳国际创意节上,安索帕全球CEO林友琴(Jean Lin)作为Digital Craft Lions(数字工艺狮)评审团主席,负责为这一新设立的奖项树立评审标准,并带领评审团选出金银铜奖和全场大奖。这是她继2015年担任Cyber Lion(数字创意狮)评审团主席之后,第二次受邀担任评审团主席。让我们跟着Jean的叙述,来了解一下在戛纳当评审团主席是一种怎样的体验…… 展开更多
关键词 评审团 CEO 工艺 CYBER 创意 国际
Guest Editorial: Special Section on Cyber Physical Power Systems(CPPS) 预览
18
作者 Ming NI Dong LIU Chanan SINGH 《现代电力系统与清洁能源学报(英文)》 2018年第5期843-845,共3页
With the deep and pervasive application of information and communication technologies, power grid has become one of the vital cyber physical systems (CPS). However, the traditional analysis or control methods for powe... With the deep and pervasive application of information and communication technologies, power grid has become one of the vital cyber physical systems (CPS). However, the traditional analysis or control methods for power grid mainly focus on the physical power system, and treat the cyber and physical systems separately. 展开更多
关键词 information communication CYBER PHYSICAL systems
在线阅读 下载PDF
网络安全法基本概念若干问题
19
作者 寿步 《网络信息法学研究》 2018年第1期3-20,308共19页
我国网络安全法以'网络'和'网络安全'等为核心概念,导致个人信息保护和违法信息管控等内容并不在'网络安全'概念的外延之内,因此《网络安全法》无法自洽,且核心概念无法与英文用语对应。如果以'ISO/IEC2703... 我国网络安全法以'网络'和'网络安全'等为核心概念,导致个人信息保护和违法信息管控等内容并不在'网络安全'概念的外延之内,因此《网络安全法》无法自洽,且核心概念无法与英文用语对应。如果以'ISO/IEC27032:2012'关于网络空间、网络空间安全、网络空间安全态、网络空间犯罪这四个术语的定义为逻辑起点,将网络空间安全与信息安全、应用程序安全、网络安全、因特网安全、关键信息基础设施保护等术语进行明确定义和区分,就可以在此基础上构建满足自洽要求的我国网络空间安全法的逻辑体系。'cyberspace/cyber'在中国法律中或中文语境下的外延应拓展到不与因特网相连接的网络上。长远来说,宜将'Cyber'音译为'赛博',将'Cyberspace'译为'赛博空间'。 展开更多
关键词 网络 网络安全 网络空间 网络空间安全 网络空间安全态 赛博
A tri-level programming model for attack-resilient control of power grids 预览
20
作者 Hamzeh DAVARIKIA Masoud BARATI 《现代电力系统与清洁能源学报(英文)》 2018年第5期918-929,共12页
The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate ha... The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender’s behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats. 展开更多
关键词 CYBER ATTACK DEFENDER HARDENING Protection RESILIENCE VULNERABILITY
在线阅读 下载PDF
上一页 1 2 187 下一页 到第
使用帮助 返回顶部 意见反馈