RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Exploiting Correlation Characteristics to Detect Covert digital communication

        ( Shuhua Huang ),( Weiwei Liu ),( Guangjie Liu ),( Yuewei Dai ),( Wen Tian ) 한국인터넷정보학회 2020 KSII Transactions on Internet and Information Syst Vol.14 No.8

        As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

      • KCI등재

        Effect of Initial Microstructure on the Hot Deformation Behavior and Microstructure Evolution of Aluminum Alloy AA2060

        Chaoyang Li,Guangjie Huang,Lingfei Cao,Ruoxi Zhang,Yu Cao,Bin Liao,Lin Lin 대한금속·재료학회 2022 METALS AND MATERIALS International Vol.28 No.7

        The microstructure evolution and hot deformation behavior of a Li-containing aluminum alloy AA2060 with different initialmicrostructure (homogenized vs. pre-rolled) were studied by isothermal hot deformation. The tests were performed within awide range of deformation temperatures of 370–490 ℃ and strain rates of 0.01–10 s−1. Results show that the stress drop ratioof the pre-rolled specimen is higher than that of the homogenized one under the same deformation condition. Microstructurewere analyzed on the thermal processing maps in unstable and optimum processing domain, and a higher dynamic recrystallizationfraction can be observed in the pre-rolled specimen that has more substructures and smaller grains. Four typesof the dynamic recrystallization were observed and the mechanism for deformation softening was discussed in this work.

      • KCI등재

        Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems

        Wen Tian,Xiaopeng Ji,Weiwei Liu,Jiangztao Zhai,Guangjie Liu,Yauwei Dai,Shuhua Huang 한국전자통신연구원 2019 ETRI Journal Vol.41 No.5

        A cyber‐physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well‐funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game‐theoretical model considering both low‐ and high‐interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼