RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory

        Liang Huang,Xinhao Chen,Xinsheng Lai 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12

        Computer network vulnerability analysis is a method of analysis and evaluation of network security beforehand. The attacks method has occurred in the network, the previous network status change as input information, calculated by the model analysis. Forecasting network node may be network attacks given the current security level value network, network security reinforcement measures taken before the danger. Administrators can proactively identify network security issues, to take measures in advance to avoid information leakage, financial losses, ensure the safety of individuals and countries. Therefore, vulnerability analysis computer network is very important. Based on the properties of attack graph shows the method of attack graphs to Bayesian network transformation, using the new algorithm to eliminate loops attribute attack graph optimization, building the Bayesian attribute attack graph model used to evaluate the network itself security situation. In this model, based on Bayes formula for calculating the probability of a new node probability calculation formula and attack paths occur for calculating network vulnerability assessment of the quantitative indicators. The model not only can visually process description of cyber attacks, but also into the Bayesian network probabilistic thinking of possible network attack path prediction and assessment.

      • KCI등재

        AKA-PLA: Enhanced AKA Based on Physical Layer Authentication

        ( Jing Yang ),( Xinsheng Ji ),( Kaizhi Huang ),( Ming Yi ),( Yajun Chen ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Existing authentication mechanisms in cellular mobile communication networks are realized in the upper layer by employing cryptographic techniques. Authentication data are broadcasted over the air in plaintext, enabling attackers to completely eavesdrop on the authentication and get some information about the shared secret key between legitimate nodes. Therefore, reusing the same secret key to authenticate several times results in the secret key`s information leakage and high attacking rate. In this paper, we consider the most representative authentication mechanism, Authentication and Key Agreement (AKA), in cellular communication networks and propose an enhanced AKA scheme based on Physical Layer Authentication (AKA-PLA). Authentication responses generated by AKA are no longer transmitted in plaintext but masked by wireless channel characteristics, which are not available to adversaries, to generate physical layer authentication responses by a fault-tolerant hash method. The authenticator sets the threshold according to the authentication requirement and channel condition, further verifies the identity of the requester based on the matching result of the physical layer authentication responses. The performance analyses show that the proposed scheme can achieve lower false alarm rate and missing rate, which are a pair of contradictions, than traditional AKA. Besides, it is well compatible with AKA.

      • KCI등재

        Waiguan Stimulation May Kindle Anticorrelated Brain Networks: Functional Magnetic Resonance Imaging Data Revisited

        Gustav Wik,Yong Huang,Tongjun Zeng,Shanshan Qu,Yu Zheng,Jiping Zhang,Xinsheng Lai,Chunzhi Tang,Baoci Shan 사단법인약침학회 2016 Journal of Acupuncture & Meridian Studies Vol.9 No.1

        Subtraction of functional magnetic resonance imaging activity data results in a loss of information regarding possible general patterns of brain activation under experimental conditions. We, hence, reanalyzed previous Waiguan acupuncture data to qualitatively elucidate patterns of cerebral correlations to acupuncture and placebo conditions. Healthy individuals (n=24) were randomly allocated to true and sham Waiguan acupuncture and to true and sham needling of a nonacupuncture point (nonacupoint), and functional magnetic resonance imaging scans were performed during stimulation. Statistical parametric mapping group comparisons revealed clearly different patterns of activation between Waiguan stimulation and the corresponding stimulation of a nonacupoint. The former condition produced less neocortical activation than the nonacupoint stimulation. Cerebellar activation was typically seen only during true Waiguan acupuncture. The reduced neocortical activity during both true and sham Waiguan acupuncture may indicate that this point activates anticorrelated networks, with possible intrinsic healing properties. Cerebellar activation during true Waiguan acupuncture implies the region's influence on healing networks.

      • KCI등재

        Variable Structure Controller Design for Linear Systems with Bounded Inputs

        Shengjian Bai,Pinhas Ben-Tzvi,Qingkun Zhou,Xinsheng Huang 제어·로봇·시스템학회 2011 International Journal of Control, Automation, and Vol.9 No.2

        This paper studies the design of variable structure systems with saturation inputs. Sliding mode domain, reaching domain, and unescapable reaching domain of linear systems with variable structure are defined and investigated. When the state matrix of the linear system is Hurwitz, the stability of the variable structure systems is proven by using passivity theory. Moreover, variable structure systems with novel nonlinear switching surfaces are proposed for second order systems. Two strategies for designing variable structure control for high order linear systems are also proposed, such as step-by-step variable structure control and moving-surface variable structure control, which were found to guarantee that the reaching condition of the variable structure control is always satisfied. Finally, an il-lustrative example pertaining to the attitude control of a flexible spacecraft demonstrates the effectiveness of the proposed methods.

      • KCI등재

        Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

        ( Chen Yajun ),( Yi Ming ),( Zhong Zhou ),( Ma Keming ),( Huang Kaizhi ),( Ji Xinsheng ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.10

        In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼