http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Vulnerable Path Attack and its Detection
( Chuyu She ),( Wushao Wen ),( Quanqi Ye ),( Kesong Zheng ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.4
Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user`s session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.
Luwei Rose Luqiu,Chuyu Liu 동아시아연구원 2018 Journal of East Asian Studies Vol.18 No.3
In this research note, we introduce a new dataset on China’s national legislators. It provides descriptive information on one key parameter: the nature of the business owned by private entrepreneur deputies in China’s National People’s Congress (NPC) from 2003 to 2017. The dataset contains information on whether the deputy once worked as a government official, whether the deputy was a former top manager of a state-owned/collective enterprise, and whether his/her current company was a state-owned/collective enterprise before being privatized. We categorize deputies as “insiders” as long as they stratify one of the aforementioned backgrounds, whereas others as the “grassroots.” This dataset thus reveals two types of private entrepreneur deputies who are significantly different with regard to how they started their own businesses. These findings shed new light on the relationship between private entrepreneurs and the party-state in China.
Shao Yazhou,Ning Anqi,An Yue,Hou Zhibo,Zhou Feng,He Chuyu,Zhang Ji,Liang Junyu 한국응용곤충학회 2021 Journal of Asia-Pacific Entomology Vol.24 No.4
Indian meal moth, Plodia interpunctella (Lepidoptera: Pyralidae), is a worldwide omnivorous pest. It is the pri mary insect pest in many economically important stored crops. The insecticidal activity of essential oils (EOs) extracted from Ajania potaninii and Ajania fruticulosa were evaluated against Plodia interpunctella. EOs obtained by hydro-distillation were analyzed by GC–MS. Fumigant toxicity testing indicated that both EOs and their main components were toxic to P. interpunctella adults. 1,8-Cineole exhibited the strongest activity, having an LC 50 of 0.86 mg/L air and being twice as active as camphor. Myrtenol was also strongly toxic to P. interpunctella adults (LC 50 0.99 mg/L air), while camphor, verbenol, borneol, and the two complete EOs exhibited lower toxicity. None of the EOs or main components exhibited significant toxicity against the larvae of P. interpunctella. This study provides evidence of the individual active substances accounting for the insecticidal activity of EOs from A. potaninii and A. fruticulosa. These EOs have potential as biological insecticides for controlling insect pest damage in stored crops.