期刊文献+
共找到1,558篇文章
< 1 2 78 >
每页显示 20 50 100
STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL 被引量:2
1
作者 逯昭义 齐藤忠夫 《Science China Mathematics》 SCIE 1990年第9期1123-1131,共9页
The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
关键词 local area network access control star-type LAN access control.
原文传递
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
2
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
在线阅读 下载PDF
Fault Tolerant Control for Networked Control Systems with Access Constraints 被引量:4
3
作者 ZHAO Ming-Yue LIU He-Ping +2 位作者 LI Zhi-Jun SUN De-Hui LIU Ke-Ping 《自动化学报》 EI CSCD 北大核心 2012年第7期1119-1126,共8页
关键词 网络控制系统 容错控制器 访问限制 Lyapunov函数法 执行器故障 采样时间 设计方法 调度方法
在线阅读 下载PDF
Towards Effective Integrated Access Control Lists in Internet Networks
4
作者 Kamal A. Ahmat Ammar Elnour 《通讯和计算机(中英文版)》 2013年第10期1284-1291,共8页
关键词 访问控制列表 INTERNET网络 有效集成 启发式算法 企业网络 安全漏洞 网络性能 ACL
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
5
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor networks GAUSS MARKOV MOBILITY Model
在线阅读 下载PDF
Performance Analysis of WLAN Medium Access Control Protocols in Simulcast Radio-Over-Fiber-Based Distributed Antenna Systems 被引量:5
6
作者 LI Jianqiang FAN Yuting CHEN Hao LU Xun XU Kun 《China Communications》 SCIE CSCD 2014年第5期37-48,共12页
The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where... The performance of three wireless local-area network(WLAN) media access control(MAC) protocols is investigated and compared in the context of simulcast radioover-fiber-based distributed antenna systems(RoF-DASs) where multiple remote antenna units(RAUs) are connected to one access point(AP) with different-length fiber links.The three WLAN MAC protocols under investigation are distributed coordination function(DCF) in basic access mode,DCF in request/clear to send(RTS/CTS) exchange mode,and point coordination function(PCF).In the analysis,the inter-RAU hidden nodes problems and fiber-length difference effect are both taken into account.Results show that adaptive PCF mechanism has better throughput performances than the other two DCF modes,especially when the inserted fiber length is short. 展开更多
关键词 radio-over-fiber wireless localarea network distributed antenna systems medium access control simulcast
在线阅读 下载PDF
Fault detection for networked systems subject to access constraints and packet dropouts 被引量:3
7
作者 Xiongbo Wan Huajing Fang Sheng Fu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第1期127-134,共8页
This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are availa... This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are available for communication at an instant and the packet dropout process,respectively.Performance indexes H∞ and H_ are introduced to describe the robustness of residual against external disturbances and sensitivity of residual to faults,respectively.By using a mode-dependent fault detection filter(FDF) as residual generator,the addressed FD problem is converted into an auxiliary filter design problem with the above index constraints.A sufficient condition for the existence of the FDF is derived in terms of certain linear matrix inequalities(LMIs).When these LMIs are feasible,the explicit expression of the desired FDF can also be characterized.A numerical example is exploited to show the usefulness of the proposed results. 展开更多
关键词 fault detection(FD) networked control system(NCS) access constraints packet dropouts linear matrix inequality(LMI).
在线阅读 下载PDF
Architectural Approaches to Network and Service Access Authentication
8
作者 Marcin Dabrowski Piotr Pacyna 《China Communications》 SCIE CSCD 2007年第3期4-16,共13页
Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wir... Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes. 展开更多
关键词 AUTHENTICATION access control wireless networks next-generation Internet
在线阅读 下载PDF
AN ADAPTIVE OPPORTUNISTIC RETRANSMISSION CONTROL SCHEME ENVIRONMENT-AWARE-BASED FOR WIRELESS MULTIMEDIA MESH NETWORKS
9
作者 Zhao Haitao Dong Yuning +1 位作者 Zhang Hui Li Yang 《Journal of Electronics(China)》 2010年第6期756-764,共9页
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env... In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput. 展开更多
关键词 Wireless Mesh networks (WMNs) Media access control (MAC) Retransmission control Environment-aware
在线阅读 下载PDF
The Novel MAC Protocol for Mixed-media PON Access Networks
10
作者 HO Jih-Hsin 《通讯和计算机(中英文版)》 2010年第6期71-75,共5页
关键词 MAC协议 PON 网络媒体 接入 混合 无源光网络 介质访问控制 网络带宽
在线阅读 下载PDF
船舶远程驾控卫星-岸基集成网络技术研究现状及展望
11
作者 胡欣珏 李麒 +3 位作者 刘佳仑 周云龙 林楠 李诗杰 《中国舰船研究》 北大核心 2025年第1期15-24,共10页
旨在优化现有远程驾控船舶的通信架构,以应对不同环境(如港口、深海和极地区域)下的网络连通性挑战,解决覆盖范围、网络带宽及通信延迟需求无法完全满足的问题。首先,系统梳理岸基通信网络技术和卫星通信网络技术的适用性和技术特点,深... 旨在优化现有远程驾控船舶的通信架构,以应对不同环境(如港口、深海和极地区域)下的网络连通性挑战,解决覆盖范围、网络带宽及通信延迟需求无法完全满足的问题。首先,系统梳理岸基通信网络技术和卫星通信网络技术的适用性和技术特点,深入分析远程驾控船舶在不同水域环境下的无线通信需求。基于此,提出一种基于融合多种无线系统的卫星-岸基集成网络架构的设计思路,将卫星与岸基网络深度融合,以期构建智能化、稳定的船舶通信系统。通过揭示具备经济性与服务质量优势的卫星-岸基集成网络架构在复杂通航环境船舶远程驾控场景中的应用潜力,以及梳理相关关键技术及现存瓶颈问题,期望所提出的集成通信网络架构可为远程驾控船舶在多样化通航网络条件下的通信优化提供理论参考。 展开更多
关键词 船舶 通信网络 卫星-岸基集成网络 远程驾控通信 通信和数据链 网络接入管理 通信优化
在线阅读 下载PDF
数据驱动下的工业网络准入控制
12
作者 张兆年 陈俊丽 《工业控制计算机》 2025年第2期4-6,共3页
为了保证工业网络在工业数字化转型下安全稳定运行,从接入侧灵活且动态地解决终端不安全的问题面临巨大挑战。以工业网络下的准入控制技术为研究对象,提出利用数据驱动的理念构建实时性数据中台。首先,将ELK架构与Kafka结合作为基础架构... 为了保证工业网络在工业数字化转型下安全稳定运行,从接入侧灵活且动态地解决终端不安全的问题面临巨大挑战。以工业网络下的准入控制技术为研究对象,提出利用数据驱动的理念构建实时性数据中台。首先,将ELK架构与Kafka结合作为基础架构,统一采集解析数据对各样式数据进行标准化。其次,通过入网身份数据化以及剖析工业网络属性,提出适用于准入控制的数据模型。最后,通过运行模型对数据中台的数据进行监控,并提供实时告警服务,总体上验证了数据中台方案的可行性。 展开更多
关键词 数据驱动 准入控制 网络安全 工业网络 数据中台
在线阅读 下载PDF
电力企业生产环境智能门禁管理系统的设计
13
作者 甘绪桐 《中国高新科技》 2025年第1期118-120,共3页
随着信息技术的飞速发展,电力企业对安全性和工作效率的要求日益提高。然而,传统的面部识别系统在光线不足、遮挡及高面部相似度等复杂环境中表现不佳。文章研究了基于遗传算法改进的ROI-KNN卷积神经网络,并在电力企业生产环境中进行测... 随着信息技术的飞速发展,电力企业对安全性和工作效率的要求日益提高。然而,传统的面部识别系统在光线不足、遮挡及高面部相似度等复杂环境中表现不佳。文章研究了基于遗传算法改进的ROI-KNN卷积神经网络,并在电力企业生产环境中进行测试。实验结果表明,改进后的系统在低光环境下识别准确率提高至98%,在遮挡条件下准确率为75.16%,在高面部相似度条件下准确率为76.8%。改进系统显著提升了智能门禁管理系统的识别性能和适应能力。 展开更多
关键词 面部识别 遗传算法 ROI-KNN卷积神经网络 智能门禁
在线阅读 下载PDF
基于动态贝叶斯博弈的工业控制网络恶意接入检测研究
14
作者 刘浩含 陈泽茂 《计算机科学》 北大核心 2025年第1期383-392,共10页
针对工业控制网络(Industrial Control Network, ICN)远程接入场景下未经授权访问、拒绝服务攻击、欺骗攻击以及信息披露等安全问题,通过STRIDE威胁建模方法对该场景下的潜在威胁进行分析,提出一种基于动态贝叶斯博弈的接入检测框架。... 针对工业控制网络(Industrial Control Network, ICN)远程接入场景下未经授权访问、拒绝服务攻击、欺骗攻击以及信息披露等安全问题,通过STRIDE威胁建模方法对该场景下的潜在威胁进行分析,提出一种基于动态贝叶斯博弈的接入检测框架。该方法能够将试图接入ICN的非法、恶意请求筛选出来并阻断,同时利用持续进行的多轮博弈迭代以及SDN灵活动态的特性对策略参数进行实时调整,以防止相同恶意接入源的再次访问。仿真实验结果表明,随着博弈轮数的增加,相比于现有的两类恶意接入防御方法,该框架的检测准确性提升了3%以上,假阳性比例下降了1.2%以上,检测效率提升了14.7%以上,且具有较好的鲁棒性。 展开更多
关键词 工业控制网络 软件定义网络 动态贝叶斯博弈 恶意接入检测
在线阅读 下载PDF
网络通信中数据安全技术应用研究
15
作者 卢斌 郑建虎 张庭玉 《通信电源技术》 2025年第1期147-149,共3页
随着信息技术和互联网的快速发展,网络通信已成为现代社会发展中不可或缺的一部分。然而,现阶段的网络通信存在数据泄露、身份伪造、非法访问等数据安全问题。在此背景下,数据安全技术成为保障网络通信安全的重点。文章基于网络通信要... 随着信息技术和互联网的快速发展,网络通信已成为现代社会发展中不可或缺的一部分。然而,现阶段的网络通信存在数据泄露、身份伪造、非法访问等数据安全问题。在此背景下,数据安全技术成为保障网络通信安全的重点。文章基于网络通信要求和数据安全技术,分析数据加密技术、身份认证技术、访问控制技术及防火墙技术等数据安全技术在网络通信中的具体应用。 展开更多
关键词 网络通信 数据安全技术 数据加密 身份认证 访问控制 防火墙
在线阅读 下载PDF
A new multi-channel MAC protocol based on CDMA for ad hoc networks 被引量:1
16
作者 贾旻 陈惠民 袁玉华 《Journal of Shanghai University(English Edition)》 CAS 2007年第2期174-177,共4页
This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code ch... This paper proposes a novel multichannel medium access control (MAC) protocol based on CDMA that improves network performance and reduces collision probability in wireless ad hoc networks. In the scheme, the code channel is divided into common channel, broadcast channel and several data channels. Simulation results show that the proposed protocol can achieve significantly better performance than the IEEE 802.11 standard. 展开更多
关键词 ad hoc networks medium access control (MAC) protocol MULTICHANNEL CDMA
在线阅读 下载PDF
基于跨层通信技术的多业务大负载量自组网通信协议设计
17
作者 李红卫 龚文毕 王桐壕 《通信与信息技术》 2025年第2期61-65,共5页
传统无线网络一般采用OSI的经典七层协议模型及TCP/IP技术体系结构,这种分层协议体系结构可以简化协议的实现,然而这种严格的分层设计方法不能很好地适应信道带宽资源有限、信道特性时变的无线多跳网络。文中设计一种基于跨层通信技术... 传统无线网络一般采用OSI的经典七层协议模型及TCP/IP技术体系结构,这种分层协议体系结构可以简化协议的实现,然而这种严格的分层设计方法不能很好地适应信道带宽资源有限、信道特性时变的无线多跳网络。文中设计一种基于跨层通信技术的可支持多种通信业务,具有较大带宽的自组网通信协议,重点从物理层、MAC层、路由层进行设计,将网络协议各层的特性参数协调融合,使协议能够以全局的方式适应业务数据传输所需的QoS要求和网络状况的变化,按需分配时频资源,从而获得更高的频谱利用效率,并设计常用的会话类、数据流类、交互类和后台类四种业务在本系统传输所需的QoS保障措施。最后对本协议的组网性能进行分析,证明其具有较好的网络综合性能。 展开更多
关键词 无线多跳网络 跨层通信协议 物理层 MAC 路由协议
在线阅读 下载PDF
大数据时代下计算机网络安全技术的挑战与对策研究
18
作者 赵金金 孙正伟 《软件》 2025年第1期178-180,共3页
随着大数据时代的到来,计算机网络技术得到了广泛应用,但与此同时,网络安全问题也日益凸显。本文探讨了大数据时代下计算机网络安全技术所面临的挑战,包括数据泄露、恶意攻击、隐私保护等。通过对这些挑战的分析,提出了相应的对策,如加... 随着大数据时代的到来,计算机网络技术得到了广泛应用,但与此同时,网络安全问题也日益凸显。本文探讨了大数据时代下计算机网络安全技术所面临的挑战,包括数据泄露、恶意攻击、隐私保护等。通过对这些挑战的分析,提出了相应的对策,如加强加密技术、完善访问控制、建立安全监测体系等,以提高计算机网络的安全性,保护用户的信息和数据安全。 展开更多
关键词 大数据时代 计算机网络安全 挑战 对策 数据泄露 加密技术 访问控制 安全监测
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
19
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
20
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
上一页 1 2 78 下一页 到第
使用帮助 返回顶部