首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
文章综述了网络攻击下无人机集群的安全协同控制技术。首先,对无人机集群相关应用背景以及实际应用中可能遭遇的问题进行介绍;然后,对现有的集群无人机协同控制技术进行总结与分析;最后,简单介绍常见的网络攻击类型与目前的安全协同控制研究进展。在此基础上,针对网络攻击下的无人机集群控制技术现状以及关键科学技术难题进行了总结与展望。  相似文献   

2.
IEEE 802.11安全算法WEP   总被引:1,自引:0,他引:1  
有线等价协议WEP是在IEEE802.1l标准中采用的信息保密机制,它主要用于保障无线局域网络中链路层信息数据的保密。对WEP的工作机理进行了分析,重点对其安全性能进行了研究,并发现WEP不能对无线局域网中的数据提供可靠的保护。最后,提出了对WEP进行改进的建议。  相似文献   

3.
张轶辉  王昭顺 《航空计算技术》2007,37(4):129-131,134
随着我国网络银行业务的不断普及,网络上的金融犯罪也日益猖獗.因此,以PKI系统为基础的安全身份认证体系也在逐步得到广泛的关注.PKI系统的一个关键安全因素是私钥的保密,但用于存储证书和私钥的USB密码钥匙仍然存在着安全漏洞,使得系统很可能成为木马攻击的对象.首先分析了基于USB密码钥匙的PKI系统的工作原理及其存在的安全漏洞,其次针对这些漏洞提出切实可行的防御策略.  相似文献   

4.
Access—list技术应用研究   总被引:2,自引:0,他引:2  
访问表是网络防御外来安全威胁的第一关 ,它是通过允许或拒绝信息流通过路由器的接口来实现的一种机制。本文介绍了访问表的基本概念、基本原理以及具有高级安全特性的新一代访问表 ,给出了一个建立应用访问表的实例 ,最后对各种网络安全威胁给出了对策及实现方案。  相似文献   

5.
Integrated Passenger Security Solutions (IP@SS) was developed to meet the present challenge faced by the aviation security industry, particularly in view of the audacious, unprecedented terrorist attacks carried out in the USA on September 11, 2001, which have changed aviation security threats beyond recognition. IP@SS is an integrated system which comprises several innovative technological sensors, databases, and advanced analysis methods aimed at accelerating passenger processing transactions and enhancing the level of security.  相似文献   

6.
The terrorist attack is one type of tragedy caused by humans. Although rare, it has catastrophic effects. In the aftermath of 9-11, it is the responsibility of security personnel to help every employee get back to business as normal, while being prepared for possible future terrorist attacks. An up-to-date contingency plan is expected to help security managers fulfill this role. Security managers should reassess or develop this contingency plan using FEMA's guidebook. They are encouraged to adopt the Homeland Security Advisory System, or to develop alternative, simple colour-coded systems to respond to the threat of terrorist attack. They are also encouraged to consider three factors in planning: top management's commitment; adequate training; and coordination with public agencies.  相似文献   

7.
Life sciences     
Space life sciences research activities are reviewed for 2003. Many life sciences experiments were lost with the tragic loss of STS-107. Life sciences experiments continue to fly as small payloads to the International Space Station (ISS) via the Russian Progress vehicle. Health-related studies continue with the Martian Radiation Environment Experiment (MARIE) aboard the Odyssey spacecraft, collecting data on the radiation environment in Mars orbit. NASA Ames increased nanotechnology research in all areas, including fundamental biology, bioastronautics, life support systems, and homeland security. Plant research efforts continued at NASA Kennedy, testing candidate crops for ISS. Research included plant growth studies at different light intensities, varying carbon dioxide concentrations, and different growth media. Education and outreach efforts included development of a NASA/USDA program called Space Agriculture in the Classroom. Canada sponsored a project called Tomatosphere, with classrooms across North America exposing seeds to simulated Mars environment for growth studies. NASA's Office of Biological and Physical Research released an updated strategic research plan.  相似文献   

8.
平潭共同家园的实现路径是以地理离岸为平台,构筑具有平潭特色的市场机制体制,从而向经济离岸领域延伸,形成以离岸为核心的区位定位和产业布局,并带动文化离岸的发展,最终实现政治离岸的新路径。  相似文献   

9.
This paper describes a security model developed from empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were invited to attack a distributed computer system. Relevant data, with respect to their intrusion activities, were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase and the innovative attack phase. The probability for successful attacks during the learning phase is expected to be small and, if a breach occurs, it is rather a result of pure luck than deliberate action. During the standard attack phase, this probability is considerably higher, whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modelling of component failures may be applicable  相似文献   

10.
Recent progress in flapping wing aerodynamics and aeroelasticity   总被引:3,自引:0,他引:3  
Micro air vehicles (MAVs) have the potential to revolutionize our sensing and information gathering capabilities in areas such as environmental monitoring and homeland security. Flapping wings with suitable wing kinematics, wing shapes, and flexible structures can enhance lift as well as thrust by exploiting large-scale vortical flow structures under various conditions. However, the scaling invariance of both fluid dynamics and structural dynamics as the size changes is fundamentally difficult. The focus of this review is to assess the recent progress in flapping wing aerodynamics and aeroelasticity. It is realized that a variation of the Reynolds number (wing sizing, flapping frequency, etc.) leads to a change in the leading edge vortex (LEV) and spanwise flow structures, which impacts the aerodynamic force generation. While in classical stationary wing theory, the tip vortices (TiVs) are seen as wasted energy, in flapping flight, they can interact with the LEV to enhance lift without increasing the power requirements. Surrogate modeling techniques can assess the aerodynamic outcomes between two- and three-dimensional wing. The combined effect of the TiVs, the LEV, and jet can improve the aerodynamics of a flapping wing. Regarding aeroelasticity, chordwise flexibility in the forward flight can substantially adjust the projected area normal to the flight trajectory via shape deformation, hence redistributing thrust and lift. Spanwise flexibility in the forward flight creates shape deformation from the wing root to the wing tip resulting in varied phase shift and effective angle of attack distribution along the wing span. Numerous open issues in flapping wing aerodynamics are highlighted.  相似文献   

11.
This paper develops a novel optimization method oriented to the resilience of multiple Unmanned Aerial Vehicle(multi-UAV) formations to achieve rapid and accurate reconfiguration under random attacks. First, a resilience metric is applied to reflect the effect and rapidity of multi-UAV formation resisting random attacks. Second, an optimization model based on a parameter optimization problem to maximize the system resilience is established. Third, an Adaptive Learning-based Pigeon-Inspired Optim...  相似文献   

12.
入侵检测中拒绝服务攻击模式分析   总被引:1,自引:0,他引:1  
基于特征的IDS为了检测到攻击,必须处理能与攻击表现相匹配的攻击描述,该过程可以简化为与网络报文部分匹配的模式描述,也可以复杂化为将多传感器输出映射到抽象攻击表现的状态机描述或神经网络描述。描述了入侵检测系统(IDS)中涉及的几个典型拒绝服务攻击(DoS)模式,对这些DoS攻击模式进行了详细的分析。DoS特征是书写检测特定攻击过滤器的必要知识,详细描述了这些DoS攻击的特征,并提出了抵御DoS攻击的一个应对措施———IDS。  相似文献   

13.
主要介绍了飞机拦阻器的控制原理,并以钢缆式液压飞机拦阻系统为对象,采用线性化的方法得出系统传递函数模型,以恒加速度为控制目标设计出了PID控制器。并将该控制器应用在飞机拦阻系统的控制中,仿真结果表明,采用此控制器的控制系统具有较好的拦阻效果,可应用于我国大多数型号军用飞机的拦阻。  相似文献   

14.
SNMPv3的用户安全模式在协议安全性和系统易用性等方面存在严重不足.针对网络安全设备管理这一特定领域,提出了一种基于PKI/数字证书的安全模式,实现了SNMP用户身份管理和通信双方安全握手过程,使得SNMP网管系统的易用性和安全性都得到了很大提高.最后分析了新的安全模式对系统性能的影响.  相似文献   

15.
阐明了网络安全体系是一个保证网络安全的体系结构,涉及到法律、技术、管理等方面;从 TCP/IP 协议体系角度对网络安全存在的问题入手分析,并对目前采用的安全策略及安全技术进行了剖析。  相似文献   

16.
随着信息技术的不断提升,航天测控网各系统中的耦合和依赖变得越来越强烈。针对这种具有相依特性的测控网络的稳定性问题,提出借助于相依网络的分析方法,根据信息在测控网中所起的作用,对航天测控网相依特性进行分析、研究,特别是相依网络的级联失效过程进行稳定性分析。将航天测控网划分为具有相依特性的数据信息和控制信息,通过针对单侧网络进行蓄意攻击,研究不同控制信息模式下航天测控系统的稳定性,提出构建稳定、高效的测控网的方法。仿真结果表明,在数据信息遭受攻击时,合理规划控制信息形态并减小控制信息规模,能够有效保障航天测控系统的稳定性。  相似文献   

17.
The importance of considering computer security as part of the software quality assurance practice is discussed. Issues that point to the need for integration of quality assurance and computer security disciplines are raised. To address some of these issues, the NASA Automated Information Security (AIS) program is presented as a model that may be used for improving interactions between the quality assurance and computer security community of professionals. The information presented does not comprise an answer to documenting all computer security interactions with quality assurance, but it does present a currently working baseline model and can serve as a basis for future research and discussion  相似文献   

18.
空间网络安全的研究是天地一体化网络研究的重要组成部分,日益受到研究人员的重视。本文根据空间网络面临的安全威胁,分析需要采用的安全机制,构建了空间网络的安全体系结构。深入分析基于身份的密码体制(IBC),在空间网络中应用IBC提供安全服务框架,以此为基础,提出了一种密钥交换协议,并详细描述了安全通信的建立过程。分析表明,同传统的基于公钥基础设施(PKI)体制的安全解决方案相比,IBC具有较低的存储、通信和计算开销,是适合空间网络的有效安全方案。  相似文献   

19.
运输类飞机安保事项   总被引:1,自引:0,他引:1       下载免费PDF全文
2002年和2008年美国联邦航空局(FAA)分别发布的联邦航空条例FAR25部第25-106和25-127修正案,对运输类飞机提出了全面的安保要求。介绍了运输类飞机安保要求的背景和演变历史,对安保要求进行了解析。最后针对安保发展趋势、在役飞机和在审型号设计及C919 飞机对安保要求的贯彻情况进行了总结。  相似文献   

20.
随着高校后勤社会化改革的不断发展,高校后勤在市场经济的大潮中不断完善、不断发展,与此同时,高校后勤又面临着进一步深化改革、建立新型服务关系和体制机构以及如何加强安全管理的新形势。如何去适应新的形势的要求,如何提高安全管理的水平,就成了摆在我们面前首先要解决的问题,着重分析了高校后勤服务中的安全管理的目的和意义,指出了高校后勤服务活动中常见事故点,分析了安全事故成因,明确了高校后勤服务中的安全管理的任务,对高校后勤安全管理的发展方向进行了探讨。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号