Hospital security and safety management最新文献

筛选
英文 中文
Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach 网络物理系统的最优注入攻击策略:动态反馈方法
Hospital security and safety management Pub Date : 2022-01-01 DOI: 10.1051/sands/2022005
Sheng Gao, Hao Zhang, Zhuping Wang, Chao Huang
{"title":"Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach","authors":"Sheng Gao, Hao Zhang, Zhuping Wang, Chao Huang","doi":"10.1051/sands/2022005","DOIUrl":"https://doi.org/10.1051/sands/2022005","url":null,"abstract":"This paper investigates the system security problem of cyber-physical systems (CPSs), which is not only more practical but also more significant to deal with than the detecting faults problem. The purpose of this paper is to find an optimal attack strategy that maximizes the output error of the attacked system with low energy consumption. Based on a general model of linear time-invariant systems and a key technical lemma, a new optimal attack strategy for the meticulously designed false data injection attack is constructed. It is worth mentioning that compared with the existing model-based attack strategies, the designed one is more general and the corresponding attack strategy is more easily implemented when system states and external input are inaccessible. Key to overcoming the inaccessible information, a dynamic observer in the form of Luenberger is constructed. Finally, a networked magnetic levitation steel ball movement system is applied to illustrate the effectiveness of the proposed scheme.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"129 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89201503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems 智能交通系统DDoS预测中未标记数据的高效投毒攻击与防御
Hospital security and safety management Pub Date : 2022-01-01 DOI: 10.1051/sands/2022003
Zhong Li, Xianke Wu, Changjun Jiang
{"title":"Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems","authors":"Zhong Li, Xianke Wu, Changjun Jiang","doi":"10.1051/sands/2022003","DOIUrl":"https://doi.org/10.1051/sands/2022003","url":null,"abstract":"Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90351526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drug Testing In The Workplace: An Update 工作场所的药物检测:最新进展
Hospital security and safety management Pub Date : 2011-10-18 DOI: 10.19030/JABR.V8I2.6175
Patricia S. Wall
{"title":"Drug Testing In The Workplace: An Update","authors":"Patricia S. Wall","doi":"10.19030/JABR.V8I2.6175","DOIUrl":"https://doi.org/10.19030/JABR.V8I2.6175","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"8 1","pages":"127-132"},"PeriodicalIF":0.0,"publicationDate":"2011-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68231577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard 符合EPC第1类第2代标准的RFID认证协议
Hospital security and safety management Pub Date : 2011-09-22 DOI: 10.1007/978-3-642-24082-9_60
Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee
{"title":"RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard","authors":"Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee","doi":"10.1007/978-3-642-24082-9_60","DOIUrl":"https://doi.org/10.1007/978-3-642-24082-9_60","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4 1","pages":"488-495"},"PeriodicalIF":0.0,"publicationDate":"2011-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75522546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks 一种基于ZRP的Ad-Hoc网络可靠路由发现方案
Hospital security and safety management Pub Date : 2004-01-01 DOI: 10.3745/KIPSTC.2004.11C.3.293
Kyoung-Ja Kim, Tae-Mu Chang
{"title":"A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks","authors":"Kyoung-Ja Kim, Tae-Mu Chang","doi":"10.3745/KIPSTC.2004.11C.3.293","DOIUrl":"https://doi.org/10.3745/KIPSTC.2004.11C.3.293","url":null,"abstract":"Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"12 1","pages":"325-331"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CA hospitals set uniform emergency codes to ease staff confusion. CA医院设置统一的紧急代码,以减轻工作人员的混乱。
{"title":"CA hospitals set uniform emergency codes to ease staff confusion.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Staff training helps hospital deal with two negative incidents. 员工培训有助于医院处理两个负面事件。
{"title":"Staff training helps hospital deal with two negative incidents.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"13-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interview with: Hugh Greeley on conducting criminal background checks. 采访:休·格里利进行犯罪背景调查。
H Greeley
{"title":"An interview with: Hugh Greeley on conducting criminal background checks.","authors":"H Greeley","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"10-3"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21959043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New developments in guard tour reporting and employee key control. 门卫巡视报告和员工钥匙控制的新进展。
{"title":"New developments in guard tour reporting and employee key control.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Among the numerous products and systems available from security product manufacturers, two have been involved for years with day-to-day activities that, if properly carried out, can result in a more secure hospital environment for individuals and greater protection from product loss or liability--guard tour reporting and key control. This report gives details on recent advances in such systems, the costs involved, and how individual hospitals are using them.</p>","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training seen key to limiting gang activity in your hospital. 培训是限制你们医院帮派活动的关键。
{"title":"Training seen key to limiting gang activity in your hospital.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"8-9"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信