Search scope:
排序: Display mode:
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
The service and application of a network is a behavioral process that is oriented toward its operationsThis paper describes scenes of network behavior as differential manifolds.behavior and propose a mathematical description of the network behavior path and behavior utility.Based on the principle of differential geometry, this paper puts forward the function of network behaviorWe also provide a calculation framework for assessment of the network’s attack-defense confrontation
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014
As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationspowers, and analyzes the functional composition and typical combat styles of the future underwater attack–defense confrontation system.and proposes corresponding suggestions for the development of the underwater attack–defense system
Keywords: underwater attack and defense confrontation system coordinated combat unmanned system
Adversarial Attacks and Defenses in Deep Learning Feature Article
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Engineering 2020, Volume 6, Issue 3, Pages 346-360 doi: 10.1016/j.eng.2019.12.012
Keywords: Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Yang CHEN, Hong-chao HU, Guo-zhen CHENG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 238-252 doi: 10.1631/FITEE.1800516
Keywords: Intranet defense Software-defined network Multi-dimensional maneuvering
Gametheoretic analysis for themechanism of moving target defense Article
Gui-lin CAI, Bao-sheng WANG, Qian-qian XING
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12, Pages 2017-2034 doi: 10.1631/FITEE.1601797
Keywords: Network security Moving target defense (MTD) Defense mechanism Defense model Game theory
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002
Keywords: artificial intelligence (AI) cyber attack and defense national security autonomous collaboration
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
The wide application of network technologies has meanwhile brought aboutthreats and data attack threats, and concludes that internal and external risk factors become the doublethreats to the industry’s dedicated network and the traditional network architecture restrictsnetwork security and reliability in the rail transit industry.for network security in the rail transit industry.
Keywords: rail transit cyberspace security network architecture customized network network attack
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Frontiers of Structural and Civil Engineering 2022, Volume 16, Issue 3, Pages 316-328 doi: 10.1007/s11709-022-0810-8
Keywords: polypropylene fiber reinforced concrete sulfate attack damage evolution behavior acoustic emission
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014
Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research
Keywords: mimic defense active defense technology cybersecurity rebalance
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only divide-and-conquer attack
A Review of the Basic Theory of Mimic Defense
Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013
Keywords: mimic defense cyberspace moving target defense mimicry transformation
Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass
Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU
Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1, Pages 129-138 doi: 10.15302/J-FASE-2017197
Keywords: antioxidants centipedegrass chilling photosynthesis polyamines
Evaluating effect of chloride attack and concrete cover on the probability of corrosion
Sanjeev Kumar VERMA, Sudhir Singh BHADAURIA, Saleem AKHTAR
Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4, Pages 379-390 doi: 10.1007/s11709-013-0223-9
Keywords: concrete chloride reinforcement corrosion deterioration cover
Title Author Date Type Operation
Calculation of the Behavior Utility of a Network System: Conception and Principle
Changzhen Hu
Journal Article
Underwater Attack–Defense Confrontation System and Its Future Development
Xie Wei, Yang Meng, Gong Junbin
Journal Article
Adversarial Attacks and Defenses in Deep Learning
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensionalnetwork properties
Yang CHEN, Hong-chao HU, Guo-zhen CHENG
Journal Article
Gametheoretic analysis for themechanism of moving target defense
Gui-lin CAI, Bao-sheng WANG, Qian-qian XING
Journal Article
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang
Journal Article
On detecting primary user emulation attack using channel impulse response in the cognitive radio network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Journal Article
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Journal Article
The damage evolution behavior of polypropylene fiber reinforced concrete subjected to sulfate attack
Ninghui LIANG; Jinwang MAO; Ru YAN; Xinrong LIU; Xiaohan ZHOU
Journal Article
A Review of the Basic Theory of Mimic Defense
Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan
Journal Article
Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass
Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU
Journal Article