-
341
A video encryption in HEVC entropy coding based on magic square
Published 2018-03-01“…In view of the multimedia information security,based on the entropy module on high efficiency video coding (HEVC/H.265),combined with the magic square,a real time and high efficiency encryption technique for high-definition video streaming was proposed.The algorithm which had an effective use of transform coefficient sparsity enabled coefficient group (CG) of transform block (TB) scrambling,and used a selective encryption on syntax elements in CG's entropy.The experiments prove that the investigated scheme has high security,which can guarantee the standard compliance and the demand of video encryption while having a low impact on encoding-rate performance.…”
Get full text
Article -
342
Approach for information systems security situation evaluation using improved FAHP and Bayesian network
Published 2009-01-01“…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
Get full text
Article -
343
User interests-based microblog tracing algorithm
Published 2020-12-01“…Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.A user interests-based tracing method (ITM) was proposed.The proposed method calculates the influence of the blogger based on the interest of the microblog blogger,and also calculates the influence of the commentators based on the interest of the commentators.The ranking algorithm was used to score the blogs according to publication time,notability and influence,and the source of the blogs was traced according to the blog score rank.Experimental results show that the accuracy of the proposed algorithm improved about 21% compared with the traditional tracing algorithms.…”
Get full text
Article -
344
Research and Application of Mobile OA Technology in Power Generation Enterprise
Published 2013-11-01“…Combining the mature page adaptation techniques with VPN, authentication system and mobile device management system, a method to build mobile OA platform architecture was proposed and strictly controlled class 2 of information system level protection to building the security system, and the mobile OA system can deliver the best user experience under the premise of information security.…”
Get full text
Article -
345
Analysis of some key technical problems in the development of computing power network
Published 2022-06-01“…The current development status of domestic and foreign computing power network technology was introduced.The key technology of the computing power network was described.The problems which were encountered in the development and practice of the computing power network technology were deeply analyzed from five aspects and the preliminary solutions were proposed.The five aspects include the computing power measurement and computing power modeling, the routing decision based on the computing power information, the computing power collaboration of cloud-edge-end, the integration of cloud and network based on service, and the computing power network information security.…”
Get full text
Article -
346
Research on national security risk assessment model of open government data
Published 2020-12-01“…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
Get full text
Article -
347
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article -
348
Light block cipher algorithm for electric power industry
Published 2015-12-01“…With the development of computer technology,cryptographic algorithms were applied more and more widely in the field of information security.However,it has been a very important problem that how to achieve high performance,high security encryption algorithm and more convenient application in the software and hardware environment.In future grid environment,study of the electric power industry special lightweight block cipher algorithm can get rid of the actual state that only using general algorithm,also makes the information and the safety of the power system more self controlled.According to the electric power industry central business security requirements,the lightweight block cipher algorithm of special power of better performance,higher safety and more convenient application were realized.…”
Get full text
Article -
349
Design and Research of S-Box Based on Dynamic Strategy
Published 2015-11-01“…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
Get full text
Article -
350
Application of fuzzy modeling in the evaluation of crisis state of enterprises
Published 2019-04-01“…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. …”
Get full text
Article -
351
Technological requirements and challenges of body area networks
Published 2018-09-01“…With the development of ubiquitous networks and huge requirements of tele-medicine,an emerged new technology of body area network (BAN) has attracted extensive attention.BAN system could be used for medical,personal health and entertainment applications by implanting wireless sensors into or around the human body,which realized real-time detection and diagnosis of physical vital signs.However,BAN had more stringent requirements on power consumption,quality of service (QoS),security performance and other specifications.Based on its technological requirements,the research status and development trends of key technologies were discussed deeply,such as information perception of vital signs,wireless transmission,information security and integrated circuit design,and the faced challenges in applications were analyzed.…”
Get full text
Article -
352
Video tamper detection method based on nonnegative tensor factorization
Published 2017-06-01“…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
Get full text
Article -
353
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
Get full text
Article -
354
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01“…With the development of mobile information, security problems of mobile applications had become the focus of attention of the user. …”
Get full text
Article -
355
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01“…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
Get full text
Article -
356
Spammer detection technology of social network based on graph convolution network
Published 2018-05-01“…In social networks,Spammer send advertisements that are useless to recipients without the recipient's permission,seriously threatening the information security of normal users and the credit system of social networking sites.In order to solve problems of extracting the shallow features and high computational complexity for the existing Spammer detection methods of social networks,a Spammer detection technology based on graph convolutional network(GCN) was proposed.Based on the network structure information,the method introduces the network representation learning algorithm to extract the network local structure feature,and combines the GCN algorithm under the re-regularization technology condition to obtain the network global structure feature to achieve the goal of detecting Spammer.Experiments are done on social network data of Tagged.com.The results show that this method has high accuracy and efficiency.…”
Get full text
Article -
357
Nanotechnology Role Development for COVID-19 Pandemic Management
Published 2022-01-01Get full text
Article -
358
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
Get full text
Article -
359
Suggestions on cyber security talents cultivation
Published 2015-12-01“…Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline and existed ones.The relationship between cyber security discipline and other dis-ciplines such as information and communication engineering,computer sciences and technology,etc was analyzed.The cyber security was divided into 5 research areas,including fundamental theory,physical security,network secu-rity,system security,data and information security.Based on a given knowledge framework,the cultivation standard for master and Ph.D.students,as well as a reference curriculum of cyber security discipline was proposed.Finally,some suggestions were given for training talents of cyber security.…”
Get full text
Article -
360
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article