期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
False Alarm Attack and Protection of Smoke Detector
1
作者 Ryan Nakata depeng li 《Smart Grid and Renewable Energy》 2022年第10期235-247,共13页
Carbon monoxide can cause serious illness or even death if the functionality of smoke alarms fails in the residential home and, in fact, more than 350 persons die every year due to the leak of carbon monoxide. However... Carbon monoxide can cause serious illness or even death if the functionality of smoke alarms fails in the residential home and, in fact, more than 350 persons die every year due to the leak of carbon monoxide. However, vulnerabilities and threats to smoke/CO alarms have not been well-studied. In this paper, through interconnect, a power replay attack has been studied in order to trigger a false alarm. The experimental results demonstrate the smoke alarm can be manipulated. This paper also concentrates on providing a sequence of security methods to defend the smoke alarm system. In future, how to protect smart detectors against attacks will be studied as this can force them to leave high-quality mode of operations. 展开更多
关键词 False Alarm Hardwired Interconnected Smoke Alarms
下载PDF
Reduce Malicious Activity in Trusted Programs
2
作者 Elliot Ito depeng li 《Journal of Computer and Communications》 2022年第10期34-49,共16页
The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either ... The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either outside of the system or are implemented in a manner that is unintuitive or confusing to users. In this paper, an access control method has been proposed that focuses on the alleviation of damage caused by such applications through the interactions between the user, application, and computer system. In details, the proposed model would work as a module or an interceptor to delegate permissions to applications through user input by using existing system calls. The evaluation about the proposed model as well as the first step implementation can show better security protection than existing systems. 展开更多
关键词 Malicious Activity
下载PDF
二氧化碳诱导热塑性聚氨酯结晶增强其拉伸性能
3
作者 李德鹏 姜修磊 +1 位作者 刘涛 赵玲 《高分子材料科学与工程》 EI CAS CSCD 北大核心 2018年第3期48-53,共6页
通过高压傅里叶变换红外光谱方法研究了CO_2对热塑性聚氨酯(TPU)氢键结构的作用,结合广角X射线衍射和扫描电镜的方法,研究了CO_2低温退火对TPU结晶性能及拉伸强度的影响。结果表明,CO_2可以与TPU产生Lewis酸碱作用,并且能降低TPU的氢键... 通过高压傅里叶变换红外光谱方法研究了CO_2对热塑性聚氨酯(TPU)氢键结构的作用,结合广角X射线衍射和扫描电镜的方法,研究了CO_2低温退火对TPU结晶性能及拉伸强度的影响。结果表明,CO_2可以与TPU产生Lewis酸碱作用,并且能降低TPU的氢键化程度;CO_2可以诱导TPU的结晶,使其结晶度增大,从而增强其拉伸强度;CO_2退火后出现微发泡,比未发泡的TPU样品拉伸强度更高。 展开更多
关键词 热塑性聚氨酯 氢键化程度 结晶性 拉伸强度
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部