-
321
Clustering Cu-S based compounds using periodic table representation and compositional Wasserstein distance
Published 2024-12-01Get full text
Article -
322
A Hybrid Human Dynamics Model on Analyzing Hotspots in Social Networks
Published 2012-01-01Get full text
Article -
323
Research on safety methods of airborne embedded software
Published 2015-11-01“…By analyzed the process of development and running of airborne software with the standards of airworthiness and information security,the factors and threats related with airborne software safety were presented,and the security protected mechanisms based on embedded TMP and MILS software architecture were provided,which all support the research on safety of embedded software on aircrafts.…”
Get full text
Article -
324
Editorial: Cybersecurity and artificial intelligence: advances, challenges, opportunities, threats
Published 2025-01-01Get full text
Article -
325
Analysis on the application and development of quantum communication
Published 2016-03-01“…Quantum communication,which can provide unconditional security,is a physical layer solutions for information security.The status and challenge of its technology development and application are the focus of the industry.The field trials of quantum communication and main problem were analyzed.Driving force and bottleneck of its commercialization were clarified and worldwide standardization research were reviewed.System performance test and evaluation were discussed and future development recommendations were also provided.…”
Get full text
Article -
326
MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES
Published 2016-05-01“…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
Get full text
Article -
327
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Get full text
Article -
328
INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY
Published 2016-04-01“…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
Get full text
Article -
329
Analysis on the progress of quantum secure communication test evaluation and standardization
Published 2018-09-01“…Quantum key distribution (QKD) based quantum secure communication (QSC) is one of the promising solutions for improving information security.With the development of experimental network construction and demonstrational application,the demand of QSC test evaluation and standardization is becoming more urgent.Based on the introduction of technology and architecture of QSC system,the latest progress of QSC test evaluation and standardization was reviewed,typical questions in test evaluation and standardization were analyzed,and development trends and prospects were also discussed.…”
Get full text
Article -
330
Analysis on the status and development of quantum secure communication standardization
Published 2018-01-01“…Quantum secure communication based on quantum key distribution,which can provide theoretically unconditional security,is one of the effective solutions to ensure information security in the future.Recently,the application and industrialization of quantum secure communication in China has developed gradually,the demand for standardization has become increasingly apparent.The worldwide project plan,research status and development trend of quantum secure communication standardization were investigated,the problems and prospects of China’s standardization research were analyzed,and further suggestions to accelerate the standardization development were also proposed.…”
Get full text
Article -
331
Research on the Defense of Advanced Persistent Threats in Enterprise Network
Published 2013-12-01“…Recently,advanced persistent threats have become a hot spot of information security industry as so many reports were taken about that some famous companies had been suffered from it. …”
Get full text
Article -
332
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
Get full text
Article -
333
Study on chaos phase space synchronous rotation and distinguish switching security communication
Published 2016-10-01“…A new chaotic dynamic system was proposed and the dynamic of this system was analyzed.Through the research of balance point,Lyapunov index,Lyapunov dimension and Poincare section,the chaotic behavior of the system was approved.Z axis of chaos system phase space was researched.Z axis rotation model in the phase space was built through introducing rotation matrix,and chaos system space synchronous rotation was researched.Based on the research results above,a chaotic distinguish switching security communication system was presented for the communication of information security.…”
Get full text
Article -
334
On a Parametric Mulholland-Type Inequality and Applications
Published 2019-01-01Get full text
Article -
335
-
336
-
337
Periodic Solutions of a Lotka-Volterra System with Delay and Diffusion
Published 2012-01-01Get full text
Article -
338
Unified operation monitoring and security warning platform based on big data in energy group
Published 2018-05-01“…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
Get full text
Article -
339
A brand new strategy of quantum relay strategy based on entanglement swapping
Published 2016-03-01“…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
Get full text
Article -
340
Novel and lightweight digital signature scheme
Published 2010-01-01“…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
Get full text
Article