期刊文献+
共找到3,031篇文章
< 1 2 152 >
每页显示 20 50 100
“安消一体化”在高校安全管理中的应用
1
作者 张媛媛 宋冰 张志伟 《工业安全与环保》 2024年第4期68-70,73,共4页
为提升校园现代化风险识别管控能力,加快推进安防与消防数据深度融合,建设“安消一体化”平台成为高校安全管理的有效抓手。“安消一体化”平台综合运用大数据、物联网、人脸识别、人工智能、云计算等前沿科技,建立全面感知、动态监测... 为提升校园现代化风险识别管控能力,加快推进安防与消防数据深度融合,建设“安消一体化”平台成为高校安全管理的有效抓手。“安消一体化”平台综合运用大数据、物联网、人脸识别、人工智能、云计算等前沿科技,建立全面感知、动态监测、智能预警、精准防火、科学疏散、快速灭火的防控体系,实现安防、消防设备设施互联互通,安消一体化管理,智能监控预警,应急联动及指挥场景化。实践应用表明,“安消一体化”平台切实提升了高校在安消设备管理、风险隐患治理、火情智能预警、应急快速联动等方面的管控效能。 展开更多
关键词 智慧校园 安消一体化 高校 安全管理
下载PDF
SSPN-RA:基于SS-petri网的工业控制系统安全一体化风险评估方法
2
作者 马梓刚 麻荣宽 +3 位作者 李贝贝 谢耀滨 魏强 彭慜威 《计算机科学》 CSCD 北大核心 2024年第10期380-390,共11页
随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文... 随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文中提出一种基于改进petri网的工业控制系统功能安全和信息安全一体化风险建模方法(Safety and Security Petri Net Risk Assessment,SSPN-RA),其中包括一体化风险识别、一体化风险分析、一体化风险评估3个步骤。所提方法首先识别并抽象化工业控制系统中的功能安全与信息安全数据,然后在风险分析过程中通过构造结合Kill Chain的petri网模型,分析出功能安全与信息安全中所存在的协同攻击路径,对petri网中功能安全与信息安全节点进行量化。同时,通过安全事件可能性以及其造成的各类损失计算出风险值,实现对工业控制系统的一体化风险评估。在开源的仿真化工工业控制系统下验证该方法的可行性,并与功能安全故障树分析和信息安全攻击树分析进行对比。实验结果表明,所提方法能够定量地得到工业控制系统的风险值,同时也解决了功能安全与信息安全单一领域分析无法识别的信息物理协同攻击和安全风险问题。 展开更多
关键词 风险评估 PETRI网 工业控制系统 安全一体化 功能安全 信息安全
下载PDF
SRS-SafeSec:安全相关系统一体化安全建模分析方法
3
作者 高仪 魏强 +1 位作者 麻荣宽 耿洋洋 《信息工程大学学报》 2024年第5期567-573,579,共8页
随着工业控制系统接入互联网,安全相关系统传统的功能安全领域面临来自信息安全的威胁与挑战,然而现有的威胁建模方法对于信息安全和功能安全的融合分析不足。对安全相关系统的冗余结构进行信息安全威胁分析,确定安全相关系统的信息安... 随着工业控制系统接入互联网,安全相关系统传统的功能安全领域面临来自信息安全的威胁与挑战,然而现有的威胁建模方法对于信息安全和功能安全的融合分析不足。对安全相关系统的冗余结构进行信息安全威胁分析,确定安全相关系统的信息安全约束,提出安全相关系统的一体化威胁模型SRS-SafeSec。实验中分别使用SRS-SafeSec方法和STPA-SafeSec方法对光气反应仿真系统进行威胁建模,比较建模方法的完备性与融合性,实验结果表明SRS-SafeSec具有更好的完备性。 展开更多
关键词 安全相关系统 功能安全 信息安全 威胁建模方法 一体化威胁建模
下载PDF
空调器室外机运转测试与安检一体化技术研究
4
作者 蔡莹 朱瑾 刘嘉 《日用电器》 2024年第10期85-89,共5页
空调器室外机生产过程中需要进行电气安全测试和模拟运转测试。目前生产模式电气安全测试和模拟运转测试是分开独立岗位进行的,在测试过程中存在多次接线、拆线问题,不同测试环节还需要专门的人员进行测试,造成人力资源浪费。现研究通... 空调器室外机生产过程中需要进行电气安全测试和模拟运转测试。目前生产模式电气安全测试和模拟运转测试是分开独立岗位进行的,在测试过程中存在多次接线、拆线问题,不同测试环节还需要专门的人员进行测试,造成人力资源浪费。现研究通过一种新的集成化测试新工艺方案,采用PLC和新开发集成测试工装,将两者测试岗位合并,并采用自动化检测技术,降低生产操作的劳动强度,合并测试后可实现减员一人。 展开更多
关键词 电气安全测试 模拟运转测试 一体化测试 耐压仪
下载PDF
工业互联网环境下智能仪表安全任务一体化调度方法研究 被引量:3
5
作者 刘璐 朱越 +2 位作者 郭伟杰 杜鑫 周纯杰 《信息安全研究》 CSCD 2023年第4期321-330,共10页
随着工业互联网的深入应用,工业控制系统从封闭隔离系统转变为开放互联系统的同时,引入了信息安全风险.传统工业控制系统仅靠防火墙等防护手段将无法抵御工业互联网中未知及新型信息攻击,攻击可在系统中渗透传播并危害到智能仪表,因此... 随着工业互联网的深入应用,工业控制系统从封闭隔离系统转变为开放互联系统的同时,引入了信息安全风险.传统工业控制系统仅靠防火墙等防护手段将无法抵御工业互联网中未知及新型信息攻击,攻击可在系统中渗透传播并危害到智能仪表,因此智能仪表本身应具有攻击检测及入侵响应能力,通过一系列信息安全任务调度实现信息安全防护.然而,信息安全任务与功能安全任务间存在潜在冲突,需要任务间协调调度以确保仪表安全稳定运行.针对智能仪表任务协调调度需求,提出仪表安全任务一体化调度方法,通过对仪表多类任务统一形式化描述的基础上协调任务间冗余及冲突关系,设计了静态-动态混合调度算法,实现任务一体化实时调度,最后通过实验验证该方法的有效性和可行性. 展开更多
关键词 智能仪表 功能安全 信息安全 冲突消解 任务调度
下载PDF
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functions 被引量:10
6
作者 Liang Jin Xiaoyan Hu +4 位作者 Yangming Lou Zhou Zhong Xiaoli Sun Huiming Wang Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第9期88-99,共12页
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm... The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed. 展开更多
关键词 wireless communication endogenous security information security functional safety
下载PDF
Cyberspace Endogenous Safety and Security 被引量:3
7
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
8
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation... Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
下载PDF
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
9
作者 Yuxin Du Xiaoli He Yongming Huang 《Journal of Computer and Communications》 2023年第3期32-46,共15页
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst... With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme. 展开更多
关键词 Cognitive Radio Networks Non-Orthogonal Multiple Access Physical Layer security Sum of safety Rates
下载PDF
第十二届工业自动化与标准化2013——再论测控系统Security & Safety“度”及实现研讨会 专家现场提问互动答疑汇总(四)
10
作者 黄劲松 周黎明 +1 位作者 梅恪 安德烈.里斯泰诺 《中国仪器仪表》 2013年第10期32-36,共5页
5月23日,杭州和利时自动化有限公司的专家做了题为:“HiaGuard安全仪表系统”演讲。针对此演讲,参会代表提出问题,由和利时专家作出如下答疑。
关键词 工业自动化 security safety 测控系统 标准化 安全仪表系统 提出问题 专家
下载PDF
A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber-Physical Systems
11
作者 Mohammed F. H. Abulamddi 《Journal of Computer and Communications》 2017年第1期94-100,共7页
The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety... The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety and security concerns in this context, we would conduct a survey exploring approaches and standards that were created by the scholars to combine safety and security requirement engineering. 展开更多
关键词 STANDARDS security safety Reconcile DEPENDABILITY Requirements
下载PDF
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
12
作者 Guiling Liao Yong Qin +4 位作者 Xiaoqing Cheng Lisha Pan Lin He Shan Yu Yuan Zhang 《Journal of Intelligent Learning Systems and Applications》 2013年第4期221-226,共6页
For the important issues of security service of rail vehicles, the online quantitative security assessment method of the service status of rail vehicles and the key equipments is urgently needed, so the method based o... For the important issues of security service of rail vehicles, the online quantitative security assessment method of the service status of rail vehicles and the key equipments is urgently needed, so the method based on safety region was proposed in the paper. At first, the formal description and definition of the safety region were given for railway engineering practice. And for the research objects which their models were known, the safety region estimation method of system stability analysis based on Lyapunov exponent was proposed;and for the research objects which their models were unknown, the data-driven safety region estimation method was presented. The safety region boundary equations of different objects can be obtained by these two different approaches. At last, by real-time analysis of the location relationship and generalized distance between the equipment service status point and safety region boundary, the online safety assessment model of key equipments can be established. This method can provide a theoretical basis for online safety evaluation of trains operation;furthermore, it can provide support for real-time monitoring, early warning and systematic maintenance of rail vehicles based on the idea of active security. 展开更多
关键词 safety REGION Service STATUS of Rail Vehicles security Assessment LYAPUNOV EXPONENT DATA-DRIVEN
下载PDF
An Analysis of Formal Risk Assessments for Safety and Security in Ports: Empirical Evidence from Container Terminals in Greece
13
作者 Constantinos I. Chlomoudis Petros A. Kostagiolas Petros L. Pallis 《Journal of Shipping and Ocean Engineering》 2012年第1期45-54,共10页
Nowadays, the most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an "acceptable level" of "safeness" mai... Nowadays, the most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an "acceptable level" of "safeness" mainly in the lines of environmental, health and hygiene and port product issues. This paper initially introduces risk assessment approaches within the emerging role of ports Thereafter, it qualitatively assesses their potential for ports by discussing issues challenging every safety and security approach within the maritime industry such as proactiveness, organization, transparency, cost-effectiveness and, when possible, calibration to specific experiences. Moreover, an empirical study was conducted in order to provide evidence for formal risk assessment for safety and security in the main Greek port container terminals of Piraeus and Thessaloniki. The empirical research is based on in-depth semi-structured interviews with the administrations of container terminals. The results include important findings, regarding the likelihood of appearance of certain risks and their perceived severity in Greek container terminals. The collected answers and their analysis are also important for confirming the suggested theoretical formal risk assessment framework for ports. 展开更多
关键词 Greek ports risk assessment safety security container terminals empirical evidence.
下载PDF
Data Envelopment Analysis Model for Assessment of Safety and Security of Intermodal Transportation Facilities
14
作者 Evangelos I.Kaisar Ramesh Teegavarapu Elisabeth Gundersen 《Journal of Traffic and Transportation Engineering》 2019年第5期191-205,共15页
Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the tran... Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the transportation infrastructure has historically been addressed as individual modes not as intermodal transportation. As a consequence of this inopportune allocation, it is now apparent that the transportation modes are disconnected and have unequal levels of security and efficiency. Improved intermodal connectivity has therefore been identified as one of the main challenges to achieve a safer, secure, and productive transportation network. Tools need to be refined for collaboration and consensus building to serve as catalysts for efficient transportation solutions. In this study, a mathematical model using data envelopment analysis (DEA) was developed and investigated to assess the safety and security of intermodal transportation facilities. The model identifies the best and worst performers by assessing several safety and security-related variables. The DEA model can assess the efficiency level of safety and security of intermodal facilities and identify potential solutions for improvement. The DEA methodology presented is general in its framework and can be applied to any network of intermodal transportation systems. Availability of credible data, complemented with DEA methodology will help in management decisions making concrete safety and security decisions for intermodal transportation facilities. 展开更多
关键词 Intermodal TRANSPORTATION security safety DATA envelopment analysis (DEA).
下载PDF
第十二届工业自动化与标准化2013——再论测控系统Security & Safety“度”及实现研讨会
15
《中国仪器仪表》 2013年第7期31-34,共4页
5月22-23日在北京召开的第十二届工业自动化与标准化2013’—再论测控系统Security&Safety"度"及实现研讨会所演讲的内容,引起了参会代表及专家们的热议和关注,并根据各自领域研究方向、应用范畴,提出了不少专业技术问题。由于研讨... 5月22-23日在北京召开的第十二届工业自动化与标准化2013’—再论测控系统Security&Safety"度"及实现研讨会所演讲的内容,引起了参会代表及专家们的热议和关注,并根据各自领域研究方向、应用范畴,提出了不少专业技术问题。由于研讨会时间有限,大部分问题未能在现场予以解答。主办方秉承不闭幕的研讨会服务宗旨,会后将继续互动交流,本刊从第7期起,将连续刊登互动讨论提出的问题。敬请大家关注。 展开更多
关键词 工业自动化 security 测控系统 safety 标准化 专业技术 服务宗旨 互动交流
下载PDF
第十二届工业自动化与标准化2013——再论测控系统Security & Safety“度”及实现研讨会 专家现场提问互动答疑汇总(二)
16
《中国仪器仪表》 2013年第8期36-39,共4页
IEC/TC65委员会5月22日,IEC/TC65委员会主席罗兰海德尔先生做了题为:"TC65:工业过程测量、控制和自动化"的演讲。针对此演讲,参会代表提出问题,由ITEI专家作了如下答疑。Q:请IEC专家介绍一下IEC 62443标准当前的制定进程和未来的... IEC/TC65委员会5月22日,IEC/TC65委员会主席罗兰海德尔先生做了题为:"TC65:工业过程测量、控制和自动化"的演讲。针对此演讲,参会代表提出问题,由ITEI专家作了如下答疑。Q:请IEC专家介绍一下IEC 62443标准当前的制定进程和未来的时间计划?A:IEC 62443-1-1《术语、概念和模型》已发布为技术规范TS;IEC62443-1-2《术语和缩略语》尚未启动;IEC 62443-1-3《系统信息安全一致性度量体系》发布征求意见草案65/532/DC,征集意见过程中;IEC 62443-2-1第二版《IACS信息安全管理系统要求》发布征求意见草案65/514/DC,征集意见过程中;由于与IEC 62443-2-1合并,IE C62443-2-2内容待定;IEC 62443-2-3《IACS环境中的补丁更新管理》 展开更多
关键词 工业自动化 security 测控系统 safety 标准化 IEC TC65 专家 安全管理系统
下载PDF
Concepts of Safety Critical Systems Unification Approach &Security Assurance Process
17
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Umar Mahmood Usman Iqbal 《Journal of Information Security》 2020年第4期292-303,共12页
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon... The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems. 展开更多
关键词 System security Assurance of Component Function safety-Critical Software Software Assurance
下载PDF
上一页 1 2 152 下一页 到第
使用帮助 返回顶部