首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   235篇
  免费   30篇
  国内免费   42篇
电工技术   14篇
化学工业   1篇
建筑科学   1篇
能源动力   3篇
轻工业   3篇
无线电   63篇
一般工业技术   47篇
自动化技术   175篇
  2024年   3篇
  2023年   34篇
  2022年   65篇
  2021年   75篇
  2020年   80篇
  2019年   23篇
  2018年   20篇
  2017年   6篇
  2016年   1篇
排序方式: 共有307条查询结果,搜索用时 15 毫秒
1.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
2.
为减少实用拜占庭容错(PBFT)算法的通信开销,现有研究主要通过选举方式在保证安全的前提下挑选少量节点参与共识,但其灵活性差、容错率低、资源耗费高。对此,通过建立信用节点列表和信用评价机制,提出一种基于可信列表的改进拜占庭容错算法(CPBFT)。仿真分析表明,较PBFT算法,CPBFT算法不仅能提高节点灵活性和容错率,还降低了约42.74%的通信带宽开销,提升了约3.12%的交易吞吐量,降低了约3.03%的时延,具有一定性能优势。  相似文献   
3.
The development in Information and Communication Technology has led to the evolution of new computing and communication environment. Technological revolution with Internet of Things (IoTs) has developed various applications in almost all domains from health care, education to entertainment with sensors and smart devices. One of the subsets of IoT is Internet of Medical things (IoMT) which connects medical devices, hardware and software applications through internet. IoMT enables secure wireless communication over the Internet to allow efficient analysis of medical data. With these smart advancements and exploitation of smart IoT devices in health care technology there increases threat and malware attacks during transmission of highly confidential medical data. This work proposes a scheme by integrating machine learning approach and block chain technology to detect malware during data transmission in IoMT. The proposed Machine Learning based Block Chain Technology malware detection scheme (MLBCT-Mdetect) is implemented in three steps namely: feature extraction, Classification and blockchain. Feature extraction is performed by calculating the weight of each feature and reduces the features with less weight. Support Vector Machine classifier is employed in the second step to classify the malware and benign nodes. Furthermore, third step uses blockchain to store details of the selected features which eventually improves the detection of malware with significant improvement in speed and accuracy. ML-BCT-Mdetect achieves higher accuracy with low false positive rate and higher True positive rate.  相似文献   
4.
With the growing maturity of blockchain technology, its peer-to-peer model and fully duplicated data storage pattern enable blockchain to act as a distributed ledger in untrustworthy environments. Blockchain storage has also become a research hotspot in industry, finance, and academia due to its security, and its unique data storage management model is gradually becoming a key technology to play its value in various fields’ applications. However, with the increasing amount of data written into the blockchain, the blockchain system faces many problems in its actual implementation of the application, such as high storage space occupation, low data flexibility and availability, low retrieval efficiency, poor scalability, etc. To improve the above problems, this paper combines off-chain storage technology and de-duplication technology to optimize the blockchain storage model. Firstly, this paper adopts the double-chain model to reduce the data storage of the major chain system, which stores a small amount of primary data and supervises the vice chain through an Application Programming Interface (API). The vice chain stores a large number of copies of data as well as non-transactional data. Our model divides the vice chain storage system into two layers, including a storage layer and a processing layer. In the processing layer, deduplication technology is applied to reduce the redundancy of vice chain data. Our double-chain storage model with high scalability enhances data flexibility, is more suitable as a distributed storage system, and performs well in data retrieval.  相似文献   
5.
As blockchain technology is gaining popularity in industry and society, solutions for Verification and Validation (V&V) of blockchain-based software applications (BC-Apps) have started gaining equal attention. To ensure that BC-Apps are properly developed before deployment, it is paramount to apply systematic V&V to verify their functional and non-functional requirements. While existing research aims at addressing the challenges of engineering BC-Apps by providing testing techniques and tools, blockchain-based software development is still an emerging research discipline, and therefore, best practices and tools for the V&V of BC-Apps are not yet sufficiently developed. In this paper, we provide a comprehensive survey on V&V solutions for BC-Apps. Specifically, using a layered approach, we synthesize V&V tools and techniques addressing different components at various layers of the BC-App stack, as well as across the whole stack. Next, we provide a discussion on the challenges associated with BC-App V&V, and summarize a set of future research directions based on the challenges and gaps identified in existing research work. Our study aims to highlight the importance of BC-App V&V and pave the way for a disciplined, testable, and verifiable BC development.  相似文献   
6.
DPoS(股权授权证明)是当前主流区块链共识机制之一,独特的节点竞选机制使其形成不断演化的区块链社区。对区块链社区演化模式进行分析可以发现共识机制的潜在风险,具有十分重要的研究意义。针对DPoS共识机制区块链数据,提出了一种新颖的共识机制效能组合分析策略,面向区块链社区演化模式,提出了一种多角度探索的可视分析方法。首先,量化了节点排名变化前后工作完成度与投票排名的差异,对共识机制的选择效能和激励效能进行组合分析;然后,针对共识机制组合效能、节点地域分布演化和节点间差异比较等方面设计可视化视图与交互手段;最后,基于EOS主链真实数据设计实现基于DPoS共识机制的区块链社区演化可视分析系统,并通过案例研究和专家评估验证所提方法的可用性及有效性。  相似文献   
7.
佘维  霍丽娟  田钊  刘炜  宋轩 《计算机科学》2022,49(1):345-352
纯文本信息隐藏容易遭受删除、更改等主动攻击,使嵌入的秘密信息遭到破坏。区块链因具有不可篡改、不可伪造、匿名性、节点信息同步等特点,成为构建隐蔽信道的天然平台,并确保秘密信息不被破坏。文中提出了一种面向纯文本信息隐藏的区块链隐蔽通信模型。首先,根据偏序关系确定嵌入秘密信息的位置,发送方使用空格法将秘密信息嵌入到纯文本内容中;然后,构建区块链网络隐蔽通信的场景,发送方将载有纯文本内容的交易发布到区块链网络上;最后,在交易打包并形成链块后,任意节点均可作为接收方获取文件,但只有受信方可以通过嵌入算法的逆过程提取出秘密信息。实验对比及分析表明,该模型具有较好的抗检测性、鲁棒性、安全性和较高的隐藏容量。更为重要的是,以区块链作为信道的方法可使受信方身份得以隐藏,通信过程的隐蔽性得到了双重保障。  相似文献   
8.
传统供应链服务的发展面临诸多痛点, 包括造假风险、企业信息孤岛、核心企业信用不能跨级传递、违约风险高等. 针对供应链企业信息孤岛以及非法用户对网络资源的非授权访问等问题, 本文提出了一种基于智能合约和企业信用的访问控制模型, 用以保障果品质量溯源系统的数据安全性和完整性. 该模型将RBAC和ABAC相结合, 以智能合约作为底层技术, 引入企业信用值作为跨域访问的参考属性, 利用主体属性与信用值作为决策依据实现域内与域间的访问控制. 实验结果表明了本文提出的访问控制模型的有效性.  相似文献   
9.
随着多云存储市场的快速发展, 越来越多的用户选择将数据存储在云上, 随之而来的是云环境中的重复数据也呈爆炸式增长. 由于云服务代理是相互独立的, 因此传统的数据去重只能消除代理本身管理的几个云服务器上的冗余数据. 为了进一步提高云环境中数据去重的力度, 本文提出了一种多代理联合去重方案. 通过区块链技术促成云服务代理间的合作, 并构建代理联盟, 将数据去重的范围从单个代理管理的云扩大到多代理管理的多云. 同时, 能够为用户、云服务代理和云服务提供商带来利益上的共赢. 实验表明, 多代理联合去重方案可以显著提高数据去重效果、节约网络带宽.  相似文献   
10.
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号