Information technology has penetrated into all aspects of politics, economy, and culture of the whole society. The information revolution has changed the way of communication all over the world, promoted the giant development of human society, and also drawn unprecedented attention to network security issues. Studies, focusing on network security, have experienced four main stages: idealized design for ensuring security, auxiliary examination and passive defense, active analysis and strategy formulation, and overall perception and trend prediction. Under the background of the new strategic command for the digital control that all countries are scrambled for, the discussion of network security situational awareness presents new characteristics both in the academic study and industrialization. In this regard, a thorough investigation has been made in the present paper into the literature of network security situational awareness. Firstly, the research status both at home and abroad is introduced, and then, the logical analysis framework is put forward concerning the network security situational awareness from the perspective of the data value chain. The whole process is composed of five successive stages: factor acquisition, model representation, measurement establishment, solution analysis, and situation prediction. Subsequently, the role of each stage and the mainstream methods are elaborated, and the application results on the experimental objects and the horizontal comparison between the methods are explained. In an attempt to provide a panoramic recognition of network security situational awareness, and auxiliary ideas for the industrialization of network security, this paper aims to provide some references for the scientific research and engineering personnel in this field.
In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman's seminal work on "communication by means of reflected power," which many consider as the first paper on RFID. The paper concluded by expressing the expectation that "considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored." It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the realisation of the goal outlined by Stockman.
This paper presents a structural equation model, focuses on the influencing factors of business model innovation. Data are collected in some small and medium-sized enterprises. Totally 237 valid questionnaires were collected, and use Smart PLS for statistical analysis. Empirical results show that technology innovation investment, enterprise knowledge and social capital have positive impact on business model innovation.
In order to study behaviors of underground mine water inrush spreading, the multiple-phase LBM based on finite-volume particles and point-particles applied to create the LBM-Lagrange simulating model of underground water inrush spreading with silt. The simulation result shows that the model can get the visual information of water-sand inrush speed, water-sand pressure and distribution of water-sand phase. Therefore some effective alternatives can be made to control underground mine water inrush.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.