首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
黎明 《科技广场》2012,(1):147-149
病毒检测与防御是计算机安全中的一个很重要的研究课题。目前,计算机病毒的花样不断地翻新,并大量使用了多重加密壳、变形、多态,传统的恶意代码查杀技术很难进行正确的查杀,这是因为病毒代码被感染后,为了躲避检测会对自己本身的代码修改替换。即使是针对未知的恶意代码,如果只是运用简单的模式匹配算法,也会被恶意代码欺骗而逃避检测。本文介绍了一种能够检测以上未知恶意代码的方法。具体来说,首先将病毒的二进制代码进行反汇编,在汇编代码层次上进行检出以及通过汇编层次检测出的模式学习和根据学习结果的分类判定来进行检测。  相似文献   

2.
张悦  杨学全 《科技风》2014,(19):6-6
跨站脚本(CrossSiteScripting)(即XSS)是Web应用程序中最为常见安全漏洞之一,一般通过在Wed页面中插入恶意代码,用户在浏览受到恶意代码攻击的网页时在Wed页面中的恶意代码便会执行,从而破坏和控制的恶意目的。本文提出了一种基于网络爬虫的XSS漏洞挖掘技术,在实践中发现该技术在应对XXS漏洞检测中具有显著效果。  相似文献   

3.
本设计是为了判断网页中是否含有这些恶意代码而产生的,它根据目前常见的一些恶意代码所执行的操作,当用IE访问这些网页的时候,如果出现这样的操作,就将这个网页判为恶意的网页。判断恶意操作的方法就是通过Hook掉一些敏感的API,当调用这些API的时候,就断定它执行了恶意的操作,从而将其网址加入恶意网址库中。  相似文献   

4.
提出了一种基于动态控制流路径分析的隐藏恶意代码检测方法.该方法首先有针对性地选取与恶意代码相关的敏感路径并动态记录其执行过程的控制流路径,然后采用基于调用层次树匹配的异常检测算法分析所获得的数据,从而检查出系统中隐藏型恶意代码.实验结果表明,该方法能有效检测出隐藏恶意代码,具有高检出率和低误报率的特点,适用于计算机操作系统内的隐藏型恶意代码的检测.  相似文献   

5.
介绍了一个更有效的基于支持向量机的实时超声波钢轨伤损自动检测分类系统.根据钢轨伤损的特点提取特征量,利用基于支持向量机的分类预测算法实现钢轨伤损的实时检测分类,并基于统计处理的计算伤损尺寸.在嵌入式系统DSP中利用该机器学习算法实现了伤损的实时处理和测试.实现了钢轨伤损实时报警、显示伤损类型、所处轨内位置及程度.  相似文献   

6.
随着互联网技术的飞速发展,人们对互联网的需求日益增加,同时互联网安全问题也逐渐引起人们的重视。其中,恶意URL(Malicious URLs)是网络安全研究的重要内容,因此实现对恶意URL的有效侦测对网络安全至关重要。本文介绍了恶意URL检测的应用背景及实现步骤,根据其攻击方式,归纳总结了两种常用的攻击方法,然后介绍了机器学习及特征工程在该领域中的应用情况,最后总结了现有方法不足之处,并对未来的研究方向做出了展望。  相似文献   

7.
CPU-GPU异构平台临界阈值的精确确定是决定GPU并行程序运算性能的关键,传统的临界阈值确定方法采用Lyapunov指数算法,在系统相轨迹过零周期数变相时系统状态不稳,零极点出现漂移,导致临界阈值检测精度不高。提出一种改进的Lyapunov指数算法下的CPU-GPU异构平台临界阈值确定方法,实现对不同幅值递增步长下的系统相变阈值的计算。仿真实验表明,采用该改进算法求解CPU-GPU异构平台临界阈值,优化GPU并行驱动程序,算法复杂度更低,计算精度较高,能有效提高GPU平台并行运算加速比,高精度阈值能在短时间内被准确确定。  相似文献   

8.
针对带有不确定参数与各种时间延迟的网络化欧拉-拉格朗日系统(EL)协调控制问题,基于图论相关理论,运用李亚普诺夫稳定性理论和频域分析方法设计了一种自适应协调控制器,本文给出的考虑参数不确定性、输入延迟和输出延迟的协调控制算法是在一个统一的理论架构下进行推导的,该协调控制算法允许不确定参数与时间延迟的存在。设计数值仿真验证了协调控制器的有效性,仿真表明,本文给出的协调控制算法能够很好地实现控制目标,EL系统的收敛条件取决于输入延迟量。  相似文献   

9.
自抗扰控制技术通过对模型不确定因素和外扰进行补偿,使得控制系统对外扰和不确定因素均有很好的适应能力,能够有效控制多种工业上较为难控的对象,表现了极强的鲁棒性和抗干扰性。倒立摆系统是一个典型的非线性、多变量、绝对不稳定的控制对象,其控制问题具有相当难度。本文应用自抗扰控制技术设计简易的实现算法,并用倒立摆系统来进行验证。仿真结果表明了算法的有效性。  相似文献   

10.
湛燕  陈昊 《大众科技》2010,(6):63-64
无导师聚类过程中将数据集合分割成几个类是一个很难确定的问题,目前还没有较好的解决方法。文章使用粒子群优化算法应用于无导师聚类算法——K-均值的参数学习,实现了使用粒子群优化算法进行聚类中心参数的确定,旨在提供一种选择中心参数个数的方法,同时给出了适应于聚类参数学习的粒子群fitness函数算法设计。通过对UCI机器学习数据库中的7个数据库进行实验,证实此方法是比较有效的。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

16.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号