The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and...The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.展开更多
The increasing impact of global warming and human activities has exacerbated the ecological environment in the Three-RiverSource National Park Region(TNPR). Understanding the temporal and spatial evolution of landscap...The increasing impact of global warming and human activities has exacerbated the ecological environment in the Three-RiverSource National Park Region(TNPR). Understanding the temporal and spatial evolution of landscape ecological vulnerability(LEV)and its influencing factors are crucial to the implementation of environmental management. Here, we aimed to: 1) construct a LEV assessment model integrating landscape structure and function;2) analyze the temporal and spatial evolution of TNPR’s LEV from 1995to 2015;3) use geographic detectors to reveal the regional influence factors of TNPR’s LEV. The main findings were: 1) grasslands, water, and bare land are important landscapes of TNPR, accounting for 98.37% of the total area. During the study period, there were significant differences in the area of different landscapes;except for desert, shrub, and urban land, the other landscape areas showed a decreasing trend. 2) During the study period, the LEV of TNPR showed a downward trend;except for grasslands, the ecological vulnerability of the other landscapes decreased steadily. Furthermore, a pattern of conversion from high to low vulnerability grade was observed in the study area. In terms of spatial distribution, the LEV level shows a trend of high at both ends(east and west) and low in the middle.3) Overall, the impact of natural factors on the ecological vulnerability of the TNPR was significantly higher than that of human factors.In conclusion, our study provides a scientific basis for landscape structure optimization and the management of regional ecological vulnerability.展开更多
In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particula...In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.展开更多
The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most...The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols.展开更多
文摘The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.
基金Under the auspices of the 2nd Comprehensive Scientific Investigation and Research Project of the Qinghai-Tibet Plateau (No. 2019QZKK0401)the Special Project for Type-A Strategic and Leading Technologies under the CAS (No. XDA20020302)。
文摘The increasing impact of global warming and human activities has exacerbated the ecological environment in the Three-RiverSource National Park Region(TNPR). Understanding the temporal and spatial evolution of landscape ecological vulnerability(LEV)and its influencing factors are crucial to the implementation of environmental management. Here, we aimed to: 1) construct a LEV assessment model integrating landscape structure and function;2) analyze the temporal and spatial evolution of TNPR’s LEV from 1995to 2015;3) use geographic detectors to reveal the regional influence factors of TNPR’s LEV. The main findings were: 1) grasslands, water, and bare land are important landscapes of TNPR, accounting for 98.37% of the total area. During the study period, there were significant differences in the area of different landscapes;except for desert, shrub, and urban land, the other landscape areas showed a decreasing trend. 2) During the study period, the LEV of TNPR showed a downward trend;except for grasslands, the ecological vulnerability of the other landscapes decreased steadily. Furthermore, a pattern of conversion from high to low vulnerability grade was observed in the study area. In terms of spatial distribution, the LEV level shows a trend of high at both ends(east and west) and low in the middle.3) Overall, the impact of natural factors on the ecological vulnerability of the TNPR was significantly higher than that of human factors.In conclusion, our study provides a scientific basis for landscape structure optimization and the management of regional ecological vulnerability.
基金supported by the Program for New Century Excellent Talents in University of China (NCET-06-0510)the National Natural Science Foundation of China (60874091)+1 种基金the Six Projects Sponsoring Talent Summits of Jiangsu Province (SJ209006)the Scientific Innovation Program for University Research Students in Jiangsu Province of China (CX08B_081Z)
文摘In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.
文摘The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols.