首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach 网络物理系统的最优注入攻击策略:动态反馈方法
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022005
Sheng Gao, Hao Zhang, Zhuping Wang, Chao Huang
This paper investigates the system security problem of cyber-physical systems (CPSs), which is not only more practical but also more significant to deal with than the detecting faults problem. The purpose of this paper is to find an optimal attack strategy that maximizes the output error of the attacked system with low energy consumption. Based on a general model of linear time-invariant systems and a key technical lemma, a new optimal attack strategy for the meticulously designed false data injection attack is constructed. It is worth mentioning that compared with the existing model-based attack strategies, the designed one is more general and the corresponding attack strategy is more easily implemented when system states and external input are inaccessible. Key to overcoming the inaccessible information, a dynamic observer in the form of Luenberger is constructed. Finally, a networked magnetic levitation steel ball movement system is applied to illustrate the effectiveness of the proposed scheme.
本文研究了网络物理系统(cps)的系统安全问题,它不仅比故障检测问题更实际,而且处理起来也更有意义。本文的目的是寻找一种最优攻击策略,使被攻击系统的输出误差在低能耗的情况下最大化。基于线性定常系统的一般模型和一个关键的技术引理,构造了针对精心设计的虚假数据注入攻击的一种新的最优攻击策略。值得一提的是,与现有的基于模型的攻击策略相比,所设计的攻击策略更具通用性,在系统状态和外部输入不可访问的情况下,更容易实现相应的攻击策略。为了克服信息的不可访问性,构造了一个Luenberger形式的动态观测器。最后,以网络化磁悬浮钢球运动系统为例,验证了该方案的有效性。
{"title":"Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach","authors":"Sheng Gao, Hao Zhang, Zhuping Wang, Chao Huang","doi":"10.1051/sands/2022005","DOIUrl":"https://doi.org/10.1051/sands/2022005","url":null,"abstract":"This paper investigates the system security problem of cyber-physical systems (CPSs), which is not only more practical but also more significant to deal with than the detecting faults problem. The purpose of this paper is to find an optimal attack strategy that maximizes the output error of the attacked system with low energy consumption. Based on a general model of linear time-invariant systems and a key technical lemma, a new optimal attack strategy for the meticulously designed false data injection attack is constructed. It is worth mentioning that compared with the existing model-based attack strategies, the designed one is more general and the corresponding attack strategy is more easily implemented when system states and external input are inaccessible. Key to overcoming the inaccessible information, a dynamic observer in the form of Luenberger is constructed. Finally, a networked magnetic levitation steel ball movement system is applied to illustrate the effectiveness of the proposed scheme.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"129 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89201503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems 智能交通系统DDoS预测中未标记数据的高效投毒攻击与防御
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022003
Zhong Li, Xianke Wu, Changjun Jiang
Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.
如今,大量与附近基站通信的智能传感器(如路边摄像头)可能会在智能交通系统中引发分布式拒绝服务(DDoS)攻击风暴。DDoS攻击会导致基站无法提供服务。因此,在考虑通信流量不均匀和隐私保护的前提下,利用分布式拒绝服务的多步特性,结合联邦学习框架,给出了一种基于隐马尔可夫模型的预测模型,用于预测未来基站是否会发生DDoS攻击。然而,在联邦学习中,我们需要考虑恶意参与者的中毒攻击问题。投毒事件将导致智能交通系统在没有安全防护的情况下瘫痪。传统的投毒攻击主要适用于带有标记数据的分类模型。在本文中,我们提出了一种基于强化学习的中毒方法,专门用于对未标记数据的预测模型进行中毒。此外,以前的相关防御策略依赖于服务器中带有标记数据的验证数据集。然而,这是不现实的,因为本地训练数据集由于隐私保护而没有上传到服务器,并且我们的数据集也是未标记的。此外,我们还提出了一种基于Dempster-Shafer (D-S)证据理论的无验证数据集防御策略,避免了异常聚集,从而获得了精确预测DDoS的鲁棒全局模型。在我们的实验中,我们结合DARPA2000数据集模拟3000个点进行评估。结果表明,该方法可以在短时间内成功地对未标记数据的全局预测模型下毒。同时,将本文提出的防御算法与三种常用的防御算法进行了比较。结果表明,该防御方法具有较高的排除投毒准确率和较高的攻击预测概率。
{"title":"Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems","authors":"Zhong Li, Xianke Wu, Changjun Jiang","doi":"10.1051/sands/2022003","DOIUrl":"https://doi.org/10.1051/sands/2022003","url":null,"abstract":"Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90351526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drug Testing In The Workplace: An Update 工作场所的药物检测:最新进展
Pub Date : 2011-10-18 DOI: 10.19030/JABR.V8I2.6175
Patricia S. Wall
{"title":"Drug Testing In The Workplace: An Update","authors":"Patricia S. Wall","doi":"10.19030/JABR.V8I2.6175","DOIUrl":"https://doi.org/10.19030/JABR.V8I2.6175","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"8 1","pages":"127-132"},"PeriodicalIF":0.0,"publicationDate":"2011-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68231577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard 符合EPC第1类第2代标准的RFID认证协议
Pub Date : 2011-09-22 DOI: 10.1007/978-3-642-24082-9_60
Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee
{"title":"RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard","authors":"Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee","doi":"10.1007/978-3-642-24082-9_60","DOIUrl":"https://doi.org/10.1007/978-3-642-24082-9_60","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4 1","pages":"488-495"},"PeriodicalIF":0.0,"publicationDate":"2011-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75522546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks 一种基于ZRP的Ad-Hoc网络可靠路由发现方案
Pub Date : 2004-01-01 DOI: 10.3745/KIPSTC.2004.11C.3.293
Kyoung-Ja Kim, Tae-Mu Chang
Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.
自组织网络是一组没有任何固定基础设施的移动主机。由于节点的移动性,网络拓扑结构的频繁变化使得这些网络非常难以管理。因此,提高ad hoc网络中路由路径的可靠性就显得尤为重要。本文提出了一种基于ZRP(区域路由协议)的路由发现方案,该方案不仅可以减少路由路径的总跳数,而且可以通过两个节点之间的认证来提高安全性。为了解决由于网络拓扑结构的频繁变化而导致的路由路径维护问题,我们采用了查询控制机制。仿真结果表明了该方案的有效性。
{"title":"A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks","authors":"Kyoung-Ja Kim, Tae-Mu Chang","doi":"10.3745/KIPSTC.2004.11C.3.293","DOIUrl":"https://doi.org/10.3745/KIPSTC.2004.11C.3.293","url":null,"abstract":"Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"12 1","pages":"325-331"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CA hospitals set uniform emergency codes to ease staff confusion. CA医院设置统一的紧急代码,以减轻工作人员的混乱。
{"title":"CA hospitals set uniform emergency codes to ease staff confusion.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Staff training helps hospital deal with two negative incidents. 员工培训有助于医院处理两个负面事件。
{"title":"Staff training helps hospital deal with two negative incidents.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"13-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interview with: Hugh Greeley on conducting criminal background checks. 采访:休·格里利进行犯罪背景调查。
H Greeley
{"title":"An interview with: Hugh Greeley on conducting criminal background checks.","authors":"H Greeley","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"10-3"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21959043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New developments in guard tour reporting and employee key control. 门卫巡视报告和员工钥匙控制的新进展。

Among the numerous products and systems available from security product manufacturers, two have been involved for years with day-to-day activities that, if properly carried out, can result in a more secure hospital environment for individuals and greater protection from product loss or liability--guard tour reporting and key control. This report gives details on recent advances in such systems, the costs involved, and how individual hospitals are using them.

在安防产品制造商提供的众多产品和系统中,有两种产品和系统已经参与了多年的日常活动,如果执行得当,可以为个人提供更安全的医院环境,并更好地防止产品丢失或责任——警卫巡视报告和钥匙控制。本报告详细介绍了这类系统的最新进展、所涉及的成本以及各医院如何使用这些系统。
{"title":"New developments in guard tour reporting and employee key control.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Among the numerous products and systems available from security product manufacturers, two have been involved for years with day-to-day activities that, if properly carried out, can result in a more secure hospital environment for individuals and greater protection from product loss or liability--guard tour reporting and key control. This report gives details on recent advances in such systems, the costs involved, and how individual hospitals are using them.</p>","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training seen key to limiting gang activity in your hospital. 培训是限制你们医院帮派活动的关键。
{"title":"Training seen key to limiting gang activity in your hospital.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"8-9"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1