期刊文献+
共找到91,257篇文章
< 1 2 250 >
每页显示 20 50 100
公路生命安全防护工程设施选用经济性分析——以G312无锡段为例 预览
1
作者 俞迪 《城市道桥与防洪》 2019年第5期197-199,202,M0021-M0022共5页
各地相继开展了公路生命安全防护工程,提高了公路安全保障水平,强化了公路安全基础,改善了公路交通安全环境,但关于生命安全防护工程的设施选用,特别是从经济角度如何选用的研究相对匮乏。以G312无锡段为例,阐述交通安全设施选用原则,... 各地相继开展了公路生命安全防护工程,提高了公路安全保障水平,强化了公路安全基础,改善了公路交通安全环境,但关于生命安全防护工程的设施选用,特别是从经济角度如何选用的研究相对匮乏。以G312无锡段为例,阐述交通安全设施选用原则,对交通标志反光膜和道路交通标线两种设施进行了经济性量化分析,为公路生命安全防护工程的实施提供理论依据。 展开更多
关键词 公路 安全 生命安全防护工程 交通安全设施 经济分析
在线阅读 下载PDF
放射性物质个体自主安全智能 预览
2
作者 阳小华 曾铁军 +3 位作者 万亚平 刘征海 毛宇 胡杰 《核安全》 2019年第2期43-48,共6页
当前放射性物质主要依靠入侵报警系统、视频监控系统和出入口控制系统等外部手段来保障安全。当面临低空、水下等安全威胁或系统故障导致外部安保系统失效时,放射性物质将失去安全保障,致使放射性物质发生丢失或被盗等核安全事件。本文... 当前放射性物质主要依靠入侵报警系统、视频监控系统和出入口控制系统等外部手段来保障安全。当面临低空、水下等安全威胁或系统故障导致外部安保系统失效时,放射性物质将失去安全保障,致使放射性物质发生丢失或被盗等核安全事件。本文提出放射性物质个体自主安全智能的概念,赋予放射性物质感知和应对自身所面临危险的能力;提出内在安全智能与外在安保能力相结合的安保级别划分,为满足不同类型的放射性物质安全性需求提供新的实现方式。 展开更多
关键词 放射性物质 安保 自主安全智能 安保级别
在线阅读 下载PDF
从共存安全到共生安全:基于边境安全特殊性的思考 预览
3
作者 刘雪莲 欧阳皓玥 《国际安全研究》 CSSCI 北大核心 2019年第2期3-23,156共22页
边境地区作为国家领土比较特殊的组成部分,代表着国家主权的至高无上性和国家领土的不容侵犯。过去,位于国家交界处的边境地区敏感脆弱,承担着维护国家“安全”和“生存”的重任,传统边境始终发挥其屏蔽功能,传统的边境安全随之体现出... 边境地区作为国家领土比较特殊的组成部分,代表着国家主权的至高无上性和国家领土的不容侵犯。过去,位于国家交界处的边境地区敏感脆弱,承担着维护国家“安全”和“生存”的重任,传统边境始终发挥其屏蔽功能,传统的边境安全随之体现出“防范危险”和“共存安全”的主要特性。如今,由于全球化进程和国家的开放政策,相应地引发了实体边界弱化和“软边界”扩散等边境地区的新变化,同时,边境屏蔽效应相对减弱,中介效应凸显,使边境地区呈现安全与发展并举甚至以发展为主导的安全态势,边境安全的特征发生重大转变。边境地区安全问题的复杂化、安全的渗透性和联动性增强、安全中注入发展的因素以及安全的社会化建构等特征与“共生”理论中的多元性、内生性、交互性、共生性等特征相似,而且有相适应的研究议题,使边境安全问题可以从共生视角进行探讨。边境安全的变化使边境在实现“共存安全”的同时强调“共生安全与发展”,在关注当下安全的同时也注重安全的未来。文章以边境安全的特殊性为视角进行研究,提出“共生安全”的新理念,并在“共存安全”和“共生安全”特性的比较中,探索边境安全乃至国家安全的未来走向。 展开更多
关键词 安全 边境安全 共存安全 共生安全 国际安全理论
在线阅读 下载PDF
A Survey: Typical Security Issues of Software-Defined Networking 预览
4
作者 Yifan Liu Bo Zhao +2 位作者 Pengyuan Zhao Peiru Fan Hui Liu 《中国通信:英文版》 SCIE CSCD 2019年第7期13-31,共19页
Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmab... Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed. 展开更多
关键词 software-defined NETWORKING network SECURITY global SECURITY SECURITY THREAT
在线阅读 下载PDF
“安全化”还是“安全议程化” 预览
5
作者 刘跃进 《山西师大学报:社会科学版》 2019年第5期40-44,共5页
汉语"安全化"一词,早在20世纪五六十年代就已存在,基本含义是"使变得安全",即"由不安全变得安全",指向的是由不安全变得安全的客观过程。20世纪90年代后期,我国学者在翻译介绍以巴瑞·布赞为代表的... 汉语"安全化"一词,早在20世纪五六十年代就已存在,基本含义是"使变得安全",即"由不安全变得安全",指向的是由不安全变得安全的客观过程。20世纪90年代后期,我国学者在翻译介绍以巴瑞·布赞为代表的哥本哈根学派安全理论时,把这一安全理论中的securitization一词,也翻译为"安全化"。但是,哥本哈根学派的securitization一词,含义与汉语中原有的"安全化"一词不同,不是"使变得安全"的含义,不是指"由不安全变得安全"的客观过程,而是指把原来不在安全讨论范围的问题纳入安全讨论范围之中进行讨论,因而是一个主观过程。因此,根据其理论解释与含义,哥本哈根学派安全理论中的securitization一词,应准确汉译为"安全议程化",而不应翻译为给人以误导的"安全化"。把一个不在安全议程内的问题纳入安全议程进行讨论,并没有改变这个问题究竟是不是安全问题的客观现实,改变的只是这个问题是否被纳入安全议程的主观认知。由于security一词在英文中的多义性,它在表达与汉语"安全"相同的"没有危险、不受威胁"的含义的同时,还可以表达人们对安全的感受,甚至可以表达安全行动、安全机构,等等,因而汉语中表达"使变得安全"之含义的"安全化",也可以翻译为英文securitization。 展开更多
关键词 安全化 安全议程化 哥本哈根学派 国家安全学 概念研究 逻辑方法
在线阅读 免费下载
A Cloud Computing Security Model Based on Noninterference
6
作者 LU Congdong QIAN Gang CHEN Tao 《武汉大学学报:自然科学英文版》 CAS CSCD 2019年第3期194-200,共7页
In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control mod... In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control models can control the information flow rather than the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing. Typical noninterference models are not suitable to verificate information flow in cloud computing. When concurrent access actions execute in the cloud architecture, security domains do not affect each other, because there is no information flow between security domains. Based on this, we propose noninterference for cloud architecture in which concurrent access and sequential access coexist. When the sequential actions execute, the information flow between security domains can flow in accordance with established rules. When concurrent access actions execute, there should not be the information flow between security domains. 展开更多
关键词 CLOUD COMPUTING SECURITY information flow SECURITY NONINTERFERENCE NONINTERFERENCE MODELS
Research on the Construction of Safety Guarantee System for Police Technical and Tactical Training in Public Security Colleg 预览
7
作者 Yuehua Zhang Ping Wang 《教育理论与管理杂志(英文)》 2019年第1期17-21,共5页
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio... The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period. 展开更多
关键词 PUBLIC SECURITY COLLEGES POLICE TECHNICAL and tactical TRAINING SECURITY system
在线阅读 免费下载
机载嵌入式软件的安全性机制研究 预览
8
作者 周光海 《电子测试》 2019年第6期18-19,共2页
在我国的航空领域发展过程中,机载嵌入式软件发挥着重要的作用,如果机载嵌入式软件出现问题将会给航空领域的发展带来不利影响。因此,本文主要是针对机载嵌入式软件的安全性机制进行研究。
关键词 机载嵌入式软件 安全性 安全评估 机制研究
在线阅读 下载PDF
Cloud Storage Security Assessment Through Equilibrium Analysis
9
作者 Yuzhao Wu Yongqiang Lyu Yuanchun Shi 《清华大学学报自然科学版(英文版)》 EI CAS CSCD 2019年第6期738-749,共12页
With ever greater amounts of data stored in cloud servers, data security and privacy issues have become increasingly important. Public cloud storage providers are semi-trustworthy because they may not have adequate se... With ever greater amounts of data stored in cloud servers, data security and privacy issues have become increasingly important. Public cloud storage providers are semi-trustworthy because they may not have adequate security mechanisms to protect user data from being stolen or misused. Therefore, it is crucial for cloud users to evaluate the security of cloud storage providers. However, existing security assessment methods mainly focus on external security risks without considering the trustworthiness of cloud providers. In addition, the widely used thirdparty mediators are assumed to be trusted and we are not aware of any work that considers the security of these mediators. This study fills these gaps by assessing the security of public cloud storage providers and third-party mediators through equilibrium analysis. More specifically, we conduct evaluations on a series of game models between public cloud storage providers and users to thoroughly analyze the security of different service scenarios.Using our proposed security assessment, users can determine the risk of whether their privacy data is likely to be hacked by the cloud service providers;the cloud service providers can also decide on strategies to make their services more trustworthy. An experimental study of 32 users verified our method and indicated its potential for real service improvement. 展开更多
关键词 CLOUD STORAGE SECURITY SECURITY ASSESSMENT EQUILIBRIUM analysis
Universally composable secure geographic area verification without pre-shared secret
10
作者 Junwei ZHANG Ning LU +1 位作者 Jianfeng MA Chao YANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2019年第3期171-185,共15页
The geographic area information of smart devices is required for realizing efficient area-based operations in 5G networks,Internet of Things,and so on.Because majority of smart devices are unmanned and are deployed in... The geographic area information of smart devices is required for realizing efficient area-based operations in 5G networks,Internet of Things,and so on.Because majority of smart devices are unmanned and are deployed in a hostile environment,secure geographic area verification is one of the important security issues for ensuring the accuracy of geographic area information of smart devices.In this study,we investigate the composition security of geographic area verification in a universally composable(UC)framework.First,we design the ideal functionality of geographic area verification;further,we propose a novel pre-shared secret-free secure geographic area verification protocol CAVδ.We also propose an improved protocol CAVδ^T exhibiting a smaller false accept ratio than that exhibited by CAVδ.The proposed protocols can be used for verifying the geographic area information of smart devices without the requirement of any pre-shared secret during the initialization phase and additional key management when the protocols are running.Furthermore,the proposed protocols support the batch verification of multiple smart devices in one run,which is considered to be suitable for several location-critical smart devices.Subsequently,in the UC framework,we proved that our protocols achieve the necessary composition security and that our proto cols exhibit an ability to resist colluding attacks. 展开更多
关键词 GEOGRAPHIC area VERIFICATION pre-shared secret-free composition SECURITY colluding attacks provable SECURITY
HASN:A Hierarchical Attack Surface Network for System Security Analysis 预览
11
作者 Kangyu Huang Lin Yang +2 位作者 Renfang Fu Shengli Zhou Zheng Hong 《中国通信:英文版》 SCIE CSCD 2019年第5期137-157,共21页
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har... Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective. 展开更多
关键词 ATTACK SURFACE SECURITY ANALYSIS SECURITY model RISK assessment
在线阅读 下载PDF
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
12
作者 Ya QIN Guo-wei SHEN +3 位作者 Wen-bo ZHAO Yan-ping CHEN Miao YU Xin JIN 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2019年第6期872-884,共13页
By network security threat intelligence analysis based on a security knowledge graph(SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is d... By network security threat intelligence analysis based on a security knowledge graph(SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template(FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods. 展开更多
关键词 NETWORK SECURITY ENTITY SECURITY knowledge graph (SKG) ENTITY recognition FEATURE TEMPLATE Neural NETWORK
The Challenge of India-US Security Cooperation to India’s Tradition of Strategic Independence 预览
13
作者 Wang Shida 《现代国际关系:英文版》 2019年第3期46-67,共22页
In recent years, India-US security cooperation has accelerated, overall defense cooperation framework has become increasingly mature and has been continuously updated with the times. The scale of India* s imports of w... In recent years, India-US security cooperation has accelerated, overall defense cooperation framework has become increasingly mature and has been continuously updated with the times. The scale of India* s imports of weapons and military supplies from the United States has continued to expand, and India-US joint military exercises have deepened. Since the Modi government took office in 2014, it has signed two basic military cooperation pacts with the United States, paving the way for further upgrading the two countries' defense cooperation in the future. India-US counter-terrorism cooperation is starting from scratch and continuing to deepen, further expanding the contents of their security cooperation. India-US close security cooperation has had a serious negative impact on India’s overall foreign strategy, especially its tradition of long-standing strategic independence. It has eroded material and institutional foundations for India ’ s strategic autonomy, and deteriorated India’ s geostrategic environment, which is not conducive to realizing its dream of being a great power. 展开更多
关键词 India-US SECURITY COOPERATION strategic AUTONOMY Communications Compatibility and SECURITY Agreement
在线阅读 下载PDF
2018:INTERNATIONAL SECURITY ORDER IN VIBRATION AND RESHAPING 预览
14
作者 MENG XIANGQING WANG XIAO 《当代世界:英文版》 2019年第1期16-20,共5页
The global security situation in 2018 continued with its recent years of complexity and volatility,with its order and rules challenged by the prevailing unilateralism and trade protectionism,the emerging nationalism a... The global security situation in 2018 continued with its recent years of complexity and volatility,with its order and rules challenged by the prevailing unilateralism and trade protectionism,the emerging nationalism and populism,the resurgent power politics and authoritarianism,theintensified competition in geopolitical and other new areas,and the incessant regional turmoil and conflicts. 展开更多
关键词 INTERNATIONAL SECURITY ORDER VIBRATION RESHAPING
在线阅读 下载PDF
某市民文化中心智能化设计案例分析
15
作者 唐艺 赵雨农 《智能建筑电气技术》 2019年第2期76-79,共4页
随着我国社会城镇化的飞速发展,为不断满足人民日益增长的美好生活需要,近些年来,全国各地市民文化中心类建筑群项目如雨后春笋般兴起。本文以湖南某市民文化中心智能化设计为例,从项目特点、需求分析、设计理念、设计内容进行了简要阐... 随着我国社会城镇化的飞速发展,为不断满足人民日益增长的美好生活需要,近些年来,全国各地市民文化中心类建筑群项目如雨后春笋般兴起。本文以湖南某市民文化中心智能化设计为例,从项目特点、需求分析、设计理念、设计内容进行了简要阐述,为市民文化中心智能化提供一种可行的设计方案及思路。 展开更多
关键词 市民文化中心 智能化 网络系统 安防
医院计算机终端安全防护研究与实践 预览
16
作者 孟晓阳 孙国强 林泽奇 《中国卫生信息管理杂志》 2019年第1期13-17,共5页
针对当前医院信息安全工作的主要问题,在广泛调研国内外终端安全防护措施的基础上,在医院规章制度、网络接入、运行管理、移动介质安全、安全检查等方面进行了实践,对实践过程中采取的措施进行了介绍,并对难点问题展开了讨论。
关键词 医院 计算机终端 安全
在线阅读 下载PDF
美国政府问责办公室《武器系统网络安全》报告解读 预览
17
作者 邹晶晶 《通信技术》 2019年第9期2278-2283,共6页
2018年10月,美国政府问责办公室(GAO)发布了《武器系统网络安全:美国防部开始应对规模性漏洞》报告,该报告称美国防部计划投入约1.66万亿美元用于研发主要武器系统。按照要求,GAO审查了国防部武器系统的网络安全状况,并从武器系统网络... 2018年10月,美国政府问责办公室(GAO)发布了《武器系统网络安全:美国防部开始应对规模性漏洞》报告,该报告称美国防部计划投入约1.66万亿美元用于研发主要武器系统。按照要求,GAO审查了国防部武器系统的网络安全状况,并从武器系统网络安全存在的问题、武器系统的脆弱性、国防部的应对措施等三个方面探讨了如何开发一个更安全的武器系统。 展开更多
关键词 武器系统 安全 网络安全 网络防御 网络攻击
在线阅读 下载PDF
井口唯一性检卡系统在煤矿的应用 预览
18
作者 岳琳 《机电工程技术》 2019年第9期165-167,共3页
随着现代电子技术、传感器技术、通讯技术的高速发展,煤矿自动化水平已经逐步提高,同时也为入井口员工自身情况的检测提供了发展的机会。根据煤炭生产企业实际情况的需求,引进入井安全检测系统,用于对入井人员的状态进行检测,以确定其... 随着现代电子技术、传感器技术、通讯技术的高速发展,煤矿自动化水平已经逐步提高,同时也为入井口员工自身情况的检测提供了发展的机会。根据煤炭生产企业实际情况的需求,引进入井安全检测系统,用于对入井人员的状态进行检测,以确定其是否达到入井的条件,从而使入井人员的安全管理工作更加规范有序。 展开更多
关键词 煤矿 人员 安全 井口 检测
在线阅读 下载PDF
基于信任模型的WSNs安全数据融合算法 预览
19
作者 叶正旺 温涛 +1 位作者 刘振宇 付崇国 《东北大学学报:自然科学版》 EI CAS CSCD 北大核心 2019年第6期789-794,共6页
为了抵御无线传感器网络内部的恶意攻击行为和故障节点的误操作行为对数据融合结果的影响,提出一种基于信任模型的多层不均匀分簇无线传感器网络安全数据融合算法.该算法基于多层不均匀的分簇网络拓扑实现安全数据融合能够有效均衡网络... 为了抵御无线传感器网络内部的恶意攻击行为和故障节点的误操作行为对数据融合结果的影响,提出一种基于信任模型的多层不均匀分簇无线传感器网络安全数据融合算法.该算法基于多层不均匀的分簇网络拓扑实现安全数据融合能够有效均衡网络中节点的能耗.通过节点间的通信行为和数据相关性建立信任评估模型,并引入动态的信任整合机制和更新机制,实现簇内和簇间的信任评估,选择可信融合节点并将可信节点所收集的数据进行基于信任值加权的数据融合.仿真实验表明,该算法能够实现精确的信任评估,有效识别内部恶意攻击节点,得到的数据融合结果具有较高的精确度,实现了安全的数据融合. 展开更多
关键词 安全 数据融合 信任模型 无线传感器网络 恶意节点
在线阅读 下载PDF
房屋建筑结构的耐久性与安全性施工质量控制研究 预览
20
作者 俞昊天 《工程建设与设计》 2019年第16期178-179,共2页
随着社会经济的不断发展,人们对于住房的要求标准不断提升,房屋建筑的结构耐久性以及安全性也受到了越来越多的关注。论文对房屋建筑过程中结构的耐久性以及安全性的有效控制进行研究,以供参考。
关键词 房屋建筑 耐久性 安全性 施工质量
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部 意见反馈