共查询到20条相似文献,搜索用时 109 毫秒
1.
文章综述了网络攻击下无人机集群的安全协同控制技术。首先,对无人机集群相关应用背景以及实际应用中可能遭遇的问题进行介绍;然后,对现有的集群无人机协同控制技术进行总结与分析;最后,简单介绍常见的网络攻击类型与目前的安全协同控制研究进展。在此基础上,针对网络攻击下的无人机集群控制技术现状以及关键科学技术难题进行了总结与展望。 相似文献
2.
IEEE 802.11安全算法WEP 总被引:1,自引:0,他引:1
有线等价协议WEP是在IEEE802.1l标准中采用的信息保密机制,它主要用于保障无线局域网络中链路层信息数据的保密。对WEP的工作机理进行了分析,重点对其安全性能进行了研究,并发现WEP不能对无线局域网中的数据提供可靠的保护。最后,提出了对WEP进行改进的建议。 相似文献
3.
随着我国网络银行业务的不断普及,网络上的金融犯罪也日益猖獗.因此,以PKI系统为基础的安全身份认证体系也在逐步得到广泛的关注.PKI系统的一个关键安全因素是私钥的保密,但用于存储证书和私钥的USB密码钥匙仍然存在着安全漏洞,使得系统很可能成为木马攻击的对象.首先分析了基于USB密码钥匙的PKI系统的工作原理及其存在的安全漏洞,其次针对这些漏洞提出切实可行的防御策略. 相似文献
4.
5.
Integrated Passenger Security Solutions (IP@SS) was developed to meet the present challenge faced by the aviation security industry, particularly in view of the audacious, unprecedented terrorist attacks carried out in the USA on September 11, 2001, which have changed aviation security threats beyond recognition. IP@SS is an integrated system which comprises several innovative technological sensors, databases, and advanced analysis methods aimed at accelerating passenger processing transactions and enhancing the level of security. 相似文献
6.
Hsiao-Ming Wang 《Aerospace and Electronic Systems Magazine, IEEE》2004,19(3):21-25
The terrorist attack is one type of tragedy caused by humans. Although rare, it has catastrophic effects. In the aftermath of 9-11, it is the responsibility of security personnel to help every employee get back to business as normal, while being prepared for possible future terrorist attacks. An up-to-date contingency plan is expected to help security managers fulfill this role. Security managers should reassess or develop this contingency plan using FEMA's guidebook. They are encouraged to adopt the Homeland Security Advisory System, or to develop alternative, simple colour-coded systems to respond to the threat of terrorist attack. They are also encouraged to consider three factors in planning: top management's commitment; adequate training; and coordination with public agencies. 相似文献
7.
Space life sciences research activities are reviewed for 2003. Many life sciences experiments were lost with the tragic loss of STS-107. Life sciences experiments continue to fly as small payloads to the International Space Station (ISS) via the Russian Progress vehicle. Health-related studies continue with the Martian Radiation Environment Experiment (MARIE) aboard the Odyssey spacecraft, collecting data on the radiation environment in Mars orbit. NASA Ames increased nanotechnology research in all areas, including fundamental biology, bioastronautics, life support systems, and homeland security. Plant research efforts continued at NASA Kennedy, testing candidate crops for ISS. Research included plant growth studies at different light intensities, varying carbon dioxide concentrations, and different growth media. Education and outreach efforts included development of a NASA/USDA program called Space Agriculture in the Classroom. Canada sponsored a project called Tomatosphere, with classrooms across North America exposing seeds to simulated Mars environment for growth studies. NASA's Office of Biological and Physical Research released an updated strategic research plan. 相似文献
8.
林晓羽 《郑州航空工业管理学院学报(管理科学版)》2014,(1):28-32
平潭共同家园的实现路径是以地理离岸为平台,构筑具有平潭特色的市场机制体制,从而向经济离岸领域延伸,形成以离岸为核心的区位定位和产业布局,并带动文化离岸的发展,最终实现政治离岸的新路径。 相似文献
9.
This paper describes a security model developed from empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were invited to attack a distributed computer system. Relevant data, with respect to their intrusion activities, were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase and the innovative attack phase. The probability for successful attacks during the learning phase is expected to be small and, if a breach occurs, it is rather a result of pure luck than deliberate action. During the standard attack phase, this probability is considerably higher, whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modelling of component failures may be applicable 相似文献
10.
Recent progress in flapping wing aerodynamics and aeroelasticity 总被引:3,自引:0,他引:3
W. Shyy H. Aono S.K. Chimakurthi P. Trizila C.-K. Kang C.E.S. Cesnik H. Liu 《Progress in Aerospace Sciences》2010
Micro air vehicles (MAVs) have the potential to revolutionize our sensing and information gathering capabilities in areas such as environmental monitoring and homeland security. Flapping wings with suitable wing kinematics, wing shapes, and flexible structures can enhance lift as well as thrust by exploiting large-scale vortical flow structures under various conditions. However, the scaling invariance of both fluid dynamics and structural dynamics as the size changes is fundamentally difficult. The focus of this review is to assess the recent progress in flapping wing aerodynamics and aeroelasticity. It is realized that a variation of the Reynolds number (wing sizing, flapping frequency, etc.) leads to a change in the leading edge vortex (LEV) and spanwise flow structures, which impacts the aerodynamic force generation. While in classical stationary wing theory, the tip vortices (TiVs) are seen as wasted energy, in flapping flight, they can interact with the LEV to enhance lift without increasing the power requirements. Surrogate modeling techniques can assess the aerodynamic outcomes between two- and three-dimensional wing. The combined effect of the TiVs, the LEV, and jet can improve the aerodynamics of a flapping wing. Regarding aeroelasticity, chordwise flexibility in the forward flight can substantially adjust the projected area normal to the flight trajectory via shape deformation, hence redistributing thrust and lift. Spanwise flexibility in the forward flight creates shape deformation from the wing root to the wing tip resulting in varied phase shift and effective angle of attack distribution along the wing span. Numerous open issues in flapping wing aerodynamics are highlighted. 相似文献
11.
Qiang FENG Xingshuo HAI Bo SUN Yi REN Zili WANG Dezhen YANG Yaolong HU Ronggen FENG 《中国航空学报》2022,35(1):110-123
This paper develops a novel optimization method oriented to the resilience of multiple Unmanned Aerial Vehicle(multi-UAV) formations to achieve rapid and accurate reconfiguration under random attacks. First, a resilience metric is applied to reflect the effect and rapidity of multi-UAV formation resisting random attacks. Second, an optimization model based on a parameter optimization problem to maximize the system resilience is established. Third, an Adaptive Learning-based Pigeon-Inspired Optim... 相似文献
12.
入侵检测中拒绝服务攻击模式分析 总被引:1,自引:0,他引:1
基于特征的IDS为了检测到攻击,必须处理能与攻击表现相匹配的攻击描述,该过程可以简化为与网络报文部分匹配的模式描述,也可以复杂化为将多传感器输出映射到抽象攻击表现的状态机描述或神经网络描述。描述了入侵检测系统(IDS)中涉及的几个典型拒绝服务攻击(DoS)模式,对这些DoS攻击模式进行了详细的分析。DoS特征是书写检测特定攻击过滤器的必要知识,详细描述了这些DoS攻击的特征,并提出了抵御DoS攻击的一个应对措施———IDS。 相似文献
13.
14.
15.
阐明了网络安全体系是一个保证网络安全的体系结构,涉及到法律、技术、管理等方面;从 TCP/IP 协议体系角度对网络安全存在的问题入手分析,并对目前采用的安全策略及安全技术进行了剖析。 相似文献
16.
随着信息技术的不断提升,航天测控网各系统中的耦合和依赖变得越来越强烈。针对这种具有相依特性的测控网络的稳定性问题,提出借助于相依网络的分析方法,根据信息在测控网中所起的作用,对航天测控网相依特性进行分析、研究,特别是相依网络的级联失效过程进行稳定性分析。将航天测控网划分为具有相依特性的数据信息和控制信息,通过针对单侧网络进行蓄意攻击,研究不同控制信息模式下航天测控系统的稳定性,提出构建稳定、高效的测控网的方法。仿真结果表明,在数据信息遭受攻击时,合理规划控制信息形态并减小控制信息规模,能够有效保障航天测控系统的稳定性。 相似文献
17.
The importance of considering computer security as part of the software quality assurance practice is discussed. Issues that point to the need for integration of quality assurance and computer security disciplines are raised. To address some of these issues, the NASA Automated Information Security (AIS) program is presented as a model that may be used for improving interactions between the quality assurance and computer security community of professionals. The information presented does not comprise an answer to documenting all computer security interactions with quality assurance, but it does present a currently working baseline model and can serve as a basis for future research and discussion 相似文献
18.
19.
张柱国 《民用飞机设计与研究》2012,(4):52
2002年和2008年美国联邦航空局(FAA)分别发布的联邦航空条例FAR25部第25-106和25-127修正案,对运输类飞机提出了全面的安保要求。介绍了运输类飞机安保要求的背景和演变历史,对安保要求进行了解析。最后针对安保发展趋势、在役飞机和在审型号设计及C919 飞机对安保要求的贯彻情况进行了总结。 相似文献
20.
朱华昶 《沈阳航空工业学院学报》2004,21(6):45-46
随着高校后勤社会化改革的不断发展,高校后勤在市场经济的大潮中不断完善、不断发展,与此同时,高校后勤又面临着进一步深化改革、建立新型服务关系和体制机构以及如何加强安全管理的新形势。如何去适应新的形势的要求,如何提高安全管理的水平,就成了摆在我们面前首先要解决的问题,着重分析了高校后勤服务中的安全管理的目的和意义,指出了高校后勤服务活动中常见事故点,分析了安全事故成因,明确了高校后勤服务中的安全管理的任务,对高校后勤安全管理的发展方向进行了探讨。 相似文献