RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Systematic Review of Studies on Cyber Physical System Security

        Peiyuan Dong,Yue Han,Xiaobo Guo,Feng Xie 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Cyber-Physical System (CPS) is a system of systems which integrates physical system with cyber capability in order to improve the physical performance [1]. So far, it is being widely applied in areas closely related to national economy and people’s daily lives. Therefore, CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. According to the researches and discussions in recent years, we believe that most researchers have already established a comprehensive understanding about CPS. This paper systematically introduced CPS’s conception, development and applications assisted. In addition, concerning about its aspects of safety and security, we also analyzed CPS’s risks and new requirements as an up-to-date technique brings. We elaborate the existing work and propose a research focus that has not been paid enough attention to, and proposed a security framework for CPS. At last, after providing a classic modeling and simulation method of CPS, we bring forward a new idea for accessing the experimental results into existing systems.

      • A Framework for Analyzing Anonymous Network Topology

        Tianbo Lu,Shixian Du,Yang Li,Peiyuan Dong,Xiaoyan Zhang 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4

        Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. In response to protect the privacy of Internet users, a variety of privacy enhancing technologies (PETs) have emerged. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. Node churn is frequent in anonymous network, which make it difficult to maintain a stable network topology, therefore it is necessary to get more insight into the overall anonymous network topology. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects. Then we survey related papers to anonymous communication published in recent years, which focus on the analysis of node selection (especially in the Tor). In addition, we present a framework of anonymous communication network topology, and a visual illustration of this analysis that shows the progression of the research of network topology and node discovery in anonymous communication. Finally, some related problems and follow-up study are presented to be studied deeply in future.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼