Zobrazeno 1 - 10
of 187
pro vyhledávání: '"Yunchuan Guo"'
Publikováno v:
网络与信息安全学报, Vol 9, Pp 83-91 (2023)
In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing th
Externí odkaz:
https://doaj.org/article/f6114b7816d84f00b6b2b6600cdf061b
Publikováno v:
Digital Communications and Networks, Vol 8, Iss 5, Pp 664-679 (2022)
Policy conflicts may cause substantial economic losses. Although a large amount of effort has been spent on detecting intra-domain policy conflict, it can not detect conflicts of heterogeneous policies. In this paper, considering background knowledge
Externí odkaz:
https://doaj.org/article/193412a06c2c4aa7a0e89796cddb85ce
Publikováno v:
Tongxin xuebao, Vol 43, Pp 27-41 (2022)
The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms
Externí odkaz:
https://doaj.org/article/6742a5e7e7f24a26a50ef615d1811560
Publikováno v:
Tongxin xuebao, Vol 43, Pp 186-201 (2022)
In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The
Externí odkaz:
https://doaj.org/article/6cd8b741cdb84eb09b00f2e0398d2e95
Publikováno v:
Nanoscale Research Letters, Vol 16, Iss 1, Pp 1-6 (2021)
Abstract It is significant to develop an efficient early detection and prediction method for ovarian cancer via a facile and low-cost approach. To address such issues, herein, we develop a novel circulating tumor cell (CTC) detection method to sensit
Externí odkaz:
https://doaj.org/article/2a31471b59cb4a8bab1d06460568f155
Publikováno v:
Tongxin xuebao, Vol 42, Pp 121-132 (2021)
To address the problem that the existing methods in multi-label learning did not efficiently deal with the problems, the instance structure based multi-label learning scheme with missing labels was proposed.By considering the feature and label struct
Externí odkaz:
https://doaj.org/article/73a051f4289548cfb349997766309ef2
Publikováno v:
网络与信息安全学报, Vol 7, Pp 132-148 (2021)
Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the
Externí odkaz:
https://doaj.org/article/395f819612304ddbbeb7cd9ddde4a5b9
Publikováno v:
Tongxin xuebao, Vol 42, Pp 87-95 (2021)
To satisfy the above requirements that due to the dynamic characteristics (e.g., the dynamic variability of threats, and the dynamic changes of protection technology) of space-ground integration information network (SGIIN), the existing security tech
Externí odkaz:
https://doaj.org/article/ae95a623fef34f5fa1bc6df87731481c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 13-22 (2021)
Due to the inaccuracy of threat detection and the scale of response policies, it is very difficult to accurately select response policies.To address the above problem, fuzzy interval decision diagram to quickly match response policy was proposed.Firs
Externí odkaz:
https://doaj.org/article/53ce1244751b4a8c84dfa85759d0f93e
Publikováno v:
网络与信息安全学报, Vol 7, Pp 20-27 (2021)
Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control model
Externí odkaz:
https://doaj.org/article/f40eb915c8c84b1b9fde887ecb824727