网络方面的英文文献
网络方面的英文文献

在IEEE通信学会的主题专家的方向在IEEE ICC这全文论文同行评审的出版2009程序敏感数据要求:做网站询问是否正确?克雷格A.树和Minaxi古普塔计算机科学系印第安纳大学{cshue,minaxi}@摘要:为了确保敏感的Web内容的安全性,一个组织必须使用TLS以确保这样做正确。
然而,很少有人知道如何使TLS实际使用在网站上。
在这项工作中,我们进行大规模的网络范围内的测量,以确定如果网站需要使用TLS的时候,当他们这样做,确保他们使用它正确。
我们发现,其中TLS几十万页要么不使用要么使用不当,将会使敏感数据处于危险之中。
引言该网站提供了电子商务前所未有的机遇。
此类交易的安全性是一般通过使用传输层安全提供性(TLS)协议[1],在标准跟踪安全的后继套接字层(SSL)协议。
TLS允许客户端验证他们访问和服务器的真实性保证在客户端之间的通信的保密性和服务器安全。
虽然以前的工作分析TLS证书和该协议本身,很少的工作重点在其网站上使用。
本文由愿望所驱使,了解TLS是怎么在今天的网络上被使用的。
Web内容的很大一部分是公开可用的,并且不要求保密性。
在很多情况下,如阅读新闻的文章或使用搜索发动机,TLS保护的好处不超过性能开销与该协议有关。
在其他情况下,敏感信息被发送并应通过TLS进行保护。
然而,仅仅使用TLS不够了;它仍然必须正确使用。
调查TLS使用在网络上,我们提出两个主要问题:是否有在网络上的网站,不使用TLS时,他们应注意什么?做到这一点使用TLS这样做正确的网站?动力对于第一个问题是敏感信息可能通过窃听者很容易被截获,除非使用TLS。
第二个问题是通过观察,TLS动机保护必须从Web服务器发送一个表格前到客户端。
否则,将含有一个表格页可以被攻击者改变,允许敏感截取数据。
几大机构,包括,,或,建立了TLS客户端后,保护已下载的网页,但在此之前提交表单数据。
这种做法,被称为安全的岗位,是通常由具有高体积的组织用户流量从未签署到页面上的表单。
参考文献中文的英文对照

参考文献中文的英文对照在学术论文中,参考文献是非常重要的一部分,它可以为论文的可信度和学术性增添分数,其中包括中文和英文文献。
以下是一些常见的参考文献中文和英文对照:1. 书籍 Book中文:王小明. 计算机网络技术. 北京:清华大学出版社,2018.英文:Wang, X. Computer Network Technology. Beijing: Tsinghua University Press, 2018.2. 学术期刊 Article in Academic Journal中文:张婷婷,李伟. 基于深度学习的影像分割方法. 计算机科学与探索,2019,13(1):61-67.英文:Zhang, T. T., Li, W. Image Segmentation Method Based on Deep Learning. Computer Science and Exploration, 2019, 13(1): 61-67.3. 会议论文 Conference Paper中文:王维,李丽. 基于云计算的智慧物流管理系统设计. 2019年国际物流与采购会议论文集,2019:112-117.英文:Wang, W., Li, L. Design of Smart Logistics Management System Based on Cloud Computing. Proceedings of the 2019 International Conference on Logistics and Procurement, 2019: 112-117.4. 学位论文 Thesis/Dissertation中文:李晓华. 基于模糊神经网络的水质评价模型研究. 博士学位论文,长春:吉林大学,2018.英文:Li, X. H. Research on Water Quality Evaluation Model Based on Fuzzy Neural Network. Doctoral Dissertation, Changchun: Jilin University, 2018.5. 报告 Report中文:国家统计局. 2019年国民经济和社会发展统计公报. 北京:中国统计出版社,2019.英文:National Bureau of Statistics. Statistical Communique of the People's Republic of China on the 2019 National Economic and Social Development. Beijing: China Statistics Press, 2019.以上是一些常见的参考文献中文和英文对照,希望对大家写作有所帮助。
免费的英文文献资料网站

有用的英文文献资料网站1.Nova Southeastern University(高权限)入口:ID:hpdlibrary PW:library资源列表:ACP Medicine (2006)AHFS Drug Information? (2006)Basic and Clinical Pharmacology - 9th Ed. (2004)Current Diagnosis & Treatment in Orthopedics - 4th Ed. (2006)Current Medical Diagnosis & Treatment - 45th Ed. (2006)Current Obstetric & Gynecologic Diagnosis & Treatment - 9th Ed. (2003) Delmar's Fundamental & Advanced Nursing Skills - 2nd Ed. (2004) Geriatric Medicine: An Evidence Based Approach - 4th Ed. (2003) Griffith's 5-Minute Clinical Consult - 14th Ed. (2006)Merck Manual - 17th Ed. (1999) Centennial EditionRudolph's Pediatrics - 21st Ed. (2003)Schwartz's Principles of Surgery - 8th Ed. (2005)Smith's General Urology - 16th Ed. (2004)USP DI? Drug Info. for the Health Care Pro. - 26th Ed. (2006)Williams Obstetrics - 22nd Ed. (2005)还有一些免费外文文献网站。
网络营销策略分析外文翻译文献

网络营销策略分析外文翻译文献(文档含中英文对照即英文原文和中文翻译)Network marketing strategy analysis of VANCLAbstract:21 century is the information century, the development of science technology, economic and social is to meet the coming of age. The network marketing is also the Internet for media, to implement marketing campaigns in the new ways, method and idea, more effective individual and organization the realization of the trading activities. Enterprise how to develop the network marketing in such a huge market potential, occupation in emerging markets, to the enterprise both opportunities and challenges. The network marketing is also produced in the change of the values of consumers: meet the needs of the consumers, is the enterprise manages the core of the eternal. Using network of this high- technology to provide consumers with various types of service, is a important way of future competition advantage.V ANCL makes a huge success by the network marketing, and becomes a Chinese clothing network marketing market leader in the short term. Based on the network marketing way as the foundation, reading V ANCL marketing strategy.Key words:Network marketing Marketing strategy V ANCLThe network marketing as a new marketing concept and marketing mode in a digital economy times, even if the enterprise opened up more broad market, and can lead and reforming the traditional marketing. The network marketing compared with the traditional marketing has the personality, interactive, economy, efficiency and obvious advantages, if V ANCL want to market in big foothold, it must learn to use the new marketing method, the most suitable for enterprise of the integration of traditional and modern marketing method.1、The marketing situation of V ANCLWith the development of the Internet, e-commerce enterprises emerging batches. The e-commerce market in other properties, once created "clothing direct sales model" the myth of a brief period of prosperity in PPG after into decline. And take thesame pattern that honesty-this is established for just two years of electronic business enterprise in the short term but has remarkable success. Why the brand whose name sounds like a lot"western style"can stand firm in the waters of the electronic commerce is owe to the network marketing .At present ,V ANCL already expands and covers to men's clothing, women's, shoes, accessories, household six big kinds, with the deep of all kinds of goods, it will become the first choice of Internet clothing buyers. V ANCL as just a new company less than two years operation, is rooted in the Internet service brand.V ANCL already cooperates with Spain, Switzerland, the United Kingdom, France, Canada, Germany, Japan, South Korea and other countries of line designers, this enterprise is relying on the Internet around the world first-class brand power integration of designer resources. From knowing less about the garment industry into konwing a lot, Chen Nian has become the senior personage, the standard of the IT expert begins to study fashion brand, and return to a clothing brand positioning, makes every guest brand visibility and reputation by the traditional clothing brand shaping path,.2、The network marketing ways of V ANCL(1)Search engine optimizationSearch engine optimization, hereinafter referred to as SEO, is through the website structure (internal links structure, physical structure, web site logic structure), high quality website the subject content, the rich and the correlation of value optimization and external links to web site to users and search engine more friendly to get at the engine advantage for website ranking into traffic. Every guest use baidu and Google, Soso and sogou search engine optimization, attract the part of the network that are not familiar with the population want to get the information in the purchase and the query of the product or want to buy the brand of want to buy, or to have a preliminary impression that the guest, or related to click, thus increasing traffic and sales of all the guest.(2)Search engine advertisingSearch engine advertising refers to the use of the search engine, classification,search for information online catalogue with function of the network tools for network expansion of method, flow out an advertising model by strong search engine, and as long as to competitive rankings and keyword advertising give priority to tone at present. Search engine advertising forms include based on search engine based on classification method and the method of directory. Search engine based on methods including keyword advertising, competitive rankings, fixed rankings, based on the content location of advertising, and a variety of forms, and based on the method of classification catalogues are mainly in the category of priority in the appropriate category website display. V ANCL A in baidu, Google, sogou search engines such as do in advertising, increased the potential customers for impression times and increased clicks, easier to customers buy all the guest products.(3)E-mail marketingE-mail marketing is the way to subscribe to the industry and products information through the email way to provide the users need to establish and users of the relationship between trust and trust. E-mail marketing has three basic factors: user license, electronic mail delivery information, information of value to the users. V ANCL via E-mail activities or convey product promotion or sells products information to users all the latest information communicate guest, the user will be according to their own product of interest to click on words or images, increase hits, it also increases the user to the attention of all the guest to some extent, also increase the purchase of the users(4)Virus marketing.Virus marketing is not use virus or rogue plug-ins to promote ways of marketing, but rather through a set of effective and reasonable integral system and stimulate active users to guide publicity, is built on the benefit users on the foundation of the marketing model. For example, every guest experience in the marketing activity to give users the experience will make the users satisfacted to others spread good image of the brand or product, cause public effects. And cause Internet industry wide attention is realized that the guest in China Internet first virus marketing, its main virus marketing example is that the popularity of the object. V ANCL uses WangLuodan and Han Han for outdoor advertising and the representative of video advertising by "love love love XX, XX XX love, love XX XX, I am not XX, I'm XX" advertising copywriter pattern, its headline font with Microsoft LOGO, black, describe the part USES a bold and then use the above model has strong grassroots fundamental key and easy to copy, imitate the AD copy font mode is called Vanclize. This virus marketing of V ANCL essence to a proverb “Many t hings grow in the garden that were never sown there ”, so-called " Vanclize " originally from former ogilvy creative director. The distant partners in the hand of QiuXinYu advertising, via the Internet after Internet users after PS widely spread, the net friend of widespread and the Internet. Virus marketing remarkable characteristics is active spreading brand or product customer information. Every object because simple style bright and clear, easy to PS, so the net friend copying its, mode for sentence transformation, and then spread, to a certain extent, to V ANCL this brand publicity.(5)Micro Po marketingThe Po marketing is to point to in the Po such a role in the user of the relationship between share information and communication and access platform of the marketing activities, mainly including release the activities of enterprises information, fans interaction, etc. The Po marketing and activity marketing, advertising, implantable customer service new platform, brand marketing linked together, September 3, 2009, sina micro blog "V ANCL fans" officially established. V ANCL use its official sina micro bo "V ANCL fans" release V ANCL and V ANCL member or the Po fans interactive activities information, forward fans put on every guest clothing display figure, release all the activities of the information and guest enterprise issued by all the members in the activities of the guest enterprise information and to make every guest house, show every guest fashion, every object such as topic marketing, and every guest fans constantly forwarding official micro bo's information to improve the every guest exposure, and shaping the every guest brand image of close to people.3、The network marketing strategy of V ANCL(1)Product strategyThe product of V ANCL is leading project by the famous designer, top the essenceof classical style of men's clothing brand, reference Asian man’ bodily form feature at the same time, select fabric dyed close-fitting production, as users enjoy luxury quality by medium price, advocate contracted, depth, comfortable, environmental protection. Simple desgin, coloring prudent style, the design concept induction from Italy, remove unnecessary decoration, emphasize the performance of heavy and complicated comfort and grace.Any products, only suitable for target consumption group needs, likes or dislikes products that may reach a good sales results. And V ANCL since will consumer orientation in 25-35 phase of the user group, so the product quality or from either from the design style is also should adapt to their spending habits. Relative to the PPG consumer groups, V ANCL in the face of some consumer groups more mature. They don't pay attention to flowery, bright, smart, fancy style, but pay more attention to quality, taste, practical and comfortable. Therefore, and the pursuit of the corresponding product positioning and design, it should be for all mankind sincere product the designers of the center of gravity of the work.(2)Price strategyAt the present V ANCL’ price is accepted by general man, besides it l aunched many favourable activity, so long as you often skim through V ANCL website any time you freed,you can get unexpected harvest, so its favourable activity will make your online purchasing car full at the same time, your wallet aren’t reduce much.V ANCL has been carried out low price strategy, such as a common advertisement-- the experience of "199 yuan four shirt", It’s very important for V ANCL to expand market share and seize the market, the whole strategy of V ANCL is to low price, high quality rapidly occupation market share first, although rolled out by this price, V ANCL isn’t loss money.But at that price in the market introduction is very low, and most of the space to consumer interests, the purpose of V ANCL is to expand the market, let consumers purchase experience, this is your data came into their database, every guest to take QQ, email, etc way to you an additional other products.(2)Channel strategyIn the diversification of Chinese clothing brand, most of the clothing is achoice of the traditional sales channel, looking for distributors, means the joining trader, but V ANCL have seen there are too many not controlling rely on of the traditional channels, so that those guests were established at the beginning of a high-level decided to use the network direct sales model.The network marketing of the realization of the purchase and trading information process and its physical process of separation is. This information process contain many reflect both trade credit information and the ability of market mechanism of the identity of business rules information, and the physical process is the product quality, efficient and transport service system to ensure that, so the network marketing operation needs to mature market mechanism, credit service system, logistics and distribution system for the foundation.4、conclusionThere are many available Internet marketing tools used by enterprises, for instance release information in the news, and using specific events to attract visitors, open up the BBS and consumer hot or project to discuss, let consumer participation in the product design, establish links, provide free E-mail, free search engine, free agency, free online services such as the screen on demand for free.Looking to the future, the network marketing is very welcome to implement in the medium-sized and small enterprises .This is because most small and medium enterprise managers have realized the benefits of developing network marketing, and actively join and enterprise website construction, this for the development of small and medium-sized enterprises lay the solid foundation after the network marketing .凡客诚品的网络营销策略分析摘要:21世纪是信息世纪,科技、经济和社会的发展正在迎接这个时代的到来。
物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。
卷积神经网络机器学习外文文献翻译中英文2020

卷积神经网络机器学习相关外文翻译中英文2020英文Prediction of composite microstructure stress-strain curves usingconvolutional neural networksCharles Yang,Youngsoo Kim,Seunghwa Ryu,Grace GuAbstractStress-strain curves are an important representation of a material's mechanical properties, from which important properties such as elastic modulus, strength, and toughness, are defined. However, generating stress-strain curves from numerical methods such as finite element method (FEM) is computationally intensive, especially when considering the entire failure path for a material. As a result, it is difficult to perform high throughput computational design of materials with large design spaces, especially when considering mechanical responses beyond the elastic limit. In this work, a combination of principal component analysis (PCA) and convolutional neural networks (CNN) are used to predict the entire stress-strain behavior of binary composites evaluated over the entire failure path, motivated by the significantly faster inference speed of empirical models. We show that PCA transforms the stress-strain curves into an effective latent space by visualizing the eigenbasis of PCA. Despite having a dataset of only 10-27% of possible microstructure configurations, the mean absolute error of the prediction is <10% of therange of values in the dataset, when measuring model performance based on derived material descriptors, such as modulus, strength, and toughness. Our study demonstrates the potential to use machine learning to accelerate material design, characterization, and optimization.Keywords:Machine learning,Convolutional neural networks,Mechanical properties,Microstructure,Computational mechanics IntroductionUnderstanding the relationship between structure and property for materials is a seminal problem in material science, with significant applications for designing next-generation materials. A primary motivating example is designing composite microstructures for load-bearing applications, as composites offer advantageously high specific strength and specific toughness. Recent advancements in additive manufacturing have facilitated the fabrication of complex composite structures, and as a result, a variety of complex designs have been fabricated and tested via 3D-printing methods. While more advanced manufacturing techniques are opening up unprecedented opportunities for advanced materials and novel functionalities, identifying microstructures with desirable properties is a difficult optimization problem.One method of identifying optimal composite designs is by constructing analytical theories. For conventional particulate/fiber-reinforced composites, a variety of homogenizationtheories have been developed to predict the mechanical properties of composites as a function of volume fraction, aspect ratio, and orientation distribution of reinforcements. Because many natural composites, synthesized via self-assembly processes, have relatively periodic and regular structures, their mechanical properties can be predicted if the load transfer mechanism of a representative unit cell and the role of the self-similar hierarchical structure are understood. However, the applicability of analytical theories is limited in quantitatively predicting composite properties beyond the elastic limit in the presence of defects, because such theories rely on the concept of representative volume element (RVE), a statistical representation of material properties, whereas the strength and failure is determined by the weakest defect in the entire sample domain. Numerical modeling based on finite element methods (FEM) can complement analytical methods for predicting inelastic properties such as strength and toughness modulus (referred to as toughness, hereafter) which can only be obtained from full stress-strain curves.However, numerical schemes capable of modeling the initiation and propagation of the curvilinear cracks, such as the crack phase field model, are computationally expensive and time-consuming because a very fine mesh is required to accommodate highly concentrated stress field near crack tip and the rapid variation of damage parameter near diffusive cracksurface. Meanwhile, analytical models require significant human effort and domain expertise and fail to generalize to similar domain problems.In order to identify high-performing composites in the midst of large design spaces within realistic time-frames, we need models that can rapidly describe the mechanical properties of complex systems and be generalized easily to analogous systems. Machine learning offers the benefit of extremely fast inference times and requires only training data to learn relationships between inputs and outputs e.g., composite microstructures and their mechanical properties. Machine learning has already been applied to speed up the optimization of several different physical systems, including graphene kirigami cuts, fine-tuning spin qubit parameters, and probe microscopy tuning. Such models do not require significant human intervention or knowledge, learn relationships efficiently relative to the input design space, and can be generalized to different systems.In this paper, we utilize a combination of principal component analysis (PCA) and convolutional neural networks (CNN) to predict the entire stress-strain c urve of composite failures beyond the elastic limit. Stress-strain curves are chosen as the model's target because t hey are difficult to predict given their high dimensionality. In addition, stress-strain curves are used to derive important material descriptors such as modulus, strength, and toughness. In this sense, predicting stress-straincurves is a more general description of composites properties than any combination of scaler material descriptors. A dataset of 100,000 different composite microstructures and their corresponding stress-strain curves are used to train and evaluate model performance. Due to the high dimensionality of the stress-strain dataset, several dimensionality reduction methods are used, including PCA, featuring a blend of domain understanding and traditional machine learning, to simplify the problem without loss of generality for the model.We will first describe our modeling methodology and the parameters of our finite-element method (FEM) used to generate data. Visualizations of the learned PCA latent space are then presented, a long with model performance results.CNN implementation and trainingA convolutional neural network was trained to predict this lower dimensional representation of the stress vector. The input to the CNN was a binary matrix representing the composite design, with 0's corresponding to soft blocks and 1's corresponding to stiff blocks. PCA was implemented with the open-source Python package scikit-learn, using the default hyperparameters. CNN was implemented using Keras with a TensorFlow backend. The batch size for all experiments was set to 16 and the number of epochs to 30; the Adam optimizer was used to update the CNN weights during backpropagation.A train/test split ratio of 95:5 is used –we justify using a smaller ratio than the standard 80:20 because of a relatively large dataset. With a ratio of 95:5 and a dataset with 100,000 instances, the test set size still has enough data points, roughly several thousands, for its results to generalize. Each column of the target PCA-representation was normalized to have a mean of 0 and a standard deviation of 1 to prevent instable training.Finite element method data generationFEM was used to generate training data for the CNN model. Although initially obtained training data is compute-intensive, it takes much less time to train the CNN model and even less time to make high-throughput inferences over thousands of new, randomly generated composites. The crack phase field solver was based on the hybrid formulation for the quasi-static fracture of elastic solids and implementedin the commercial FEM software ABAQUS with a user-element subroutine (UEL).Visualizing PCAIn order to better understand the role PCA plays in effectively capturing the information contained in stress-strain curves, the principal component representation of stress-strain curves is plotted in 3 dimensions. Specifically, we take the first three principal components, which have a cumulative explained variance ~85%, and plot stress-strain curves in that basis and provide several different angles from which toview the 3D plot. Each point represents a stress-strain curve in the PCA latent space and is colored based on the associated modulus value. it seems that the PCA is able to spread out the curves in the latent space based on modulus values, which suggests that this is a useful latent space for CNN to make predictions in.CNN model design and performanceOur CNN was a fully convolutional neural network i.e. the only dense layer was the output layer. All convolution layers used 16 filters with a stride of 1, with a LeakyReLU activation followed by BatchNormalization. The first 3 Conv blocks did not have 2D MaxPooling, followed by 9 conv blocks which did have a 2D MaxPooling layer, placed after the BatchNormalization layer. A GlobalAveragePooling was used to reduce the dimensionality of the output tensor from the sequential convolution blocks and the final output layer was a Dense layer with 15 nodes, where each node corresponded to a principal component. In total, our model had 26,319 trainable weights.Our architecture was motivated by the recent development and convergence onto fully-convolutional architectures for traditional computer vision applications, where convolutions are empirically observed to be more efficient and stable for learning as opposed to dense layers. In addition, in our previous work, we had shown that CNN's werea capable architecture for learning to predict mechanical properties of 2Dcomposites [30]. The convolution operation is an intuitively good fit forpredicting crack propagation because it is a local operation, allowing it toimplicitly featurize and learn the local spatial effects of crack propagation.After applying PCA transformation to reduce the dimensionality ofthe target variable, CNN is used to predict the PCA representation of thestress-strain curve of a given binary composite design. After training theCNN on a training set, its ability to generalize to composite designs it hasnot seen is evaluated by comparing its predictions on an unseen test set.However, a natural question that emerges i s how to evaluate a model's performance at predicting stress-strain curves in a real-world engineeringcontext. While simple scaler metrics such as mean squared error (MSE)and mean absolute error (MAE) generalize easily to vector targets, it isnot clear how to interpret these aggregate summaries of performance. It isdifficult to use such metrics to ask questions such as “Is this modeand “On average, how poorly will aenough to use in the real world” given prediction be incorrect relative to some given specification”. Although being able to predict stress-strain curves is an importantapplication of FEM and a highly desirable property for any machinelearning model to learn, it does not easily lend itself to interpretation. Specifically, there is no simple quantitative way to define whether two-world units.stress-s train curves are “close” or “similar” with real Given that stress-strain curves are oftentimes intermediary representations of a composite property that are used to derive more meaningful descriptors such as modulus, strength, and toughness, we decided to evaluate the model in an analogous fashion. The CNN prediction in the PCA latent space representation is transformed back to a stress-strain curve using PCA, and used to derive the predicted modulus, strength, and toughness of the composite. The predicted material descriptors are then compared with the actual material descriptors. In this way, MSE and MAE now have clearly interpretable units and meanings. The average performance of the model with respect to the error between the actual and predicted material descriptor values derived from stress-strain curves are presented in Table. The MAE for material descriptors provides an easily interpretable metric of model performance and can easily be used in any design specification to provide confidence estimates of a model prediction. When comparing the mean absolute error (MAE) to the range of values taken on by the distribution of material descriptors, we can see that the MAE is relatively small compared to the range. The MAE compared to the range is <10% for all material descriptors. Relatively tight confidence intervals on the error indicate that this model architecture is stable, the model performance is not heavily dependent on initialization, and that our results are robust to differenttrain-test splits of the data.Future workFuture work includes combining empirical models with optimization algorithms, such as gradient-based methods, to identify composite designs that yield complementary mechanical properties. The ability of a trained empirical model to make high-throughput predictions over designs it has never seen before allows for large parameter space optimization that would be computationally infeasible for FEM. In addition, we plan to explore different visualizations of empirical models-box” of such models. Applying machine in an effort to “open up the blacklearning to finite-element methods is a rapidly growing field with the potential to discover novel next-generation materials tailored for a variety of applications. We also note that the proposed method can be readily applied to predict other physical properties represented in a similar vectorized format, such as electron/phonon density of states, and sound/light absorption spectrum.ConclusionIn conclusion, we applied PCA and CNN to rapidly and accurately predict the stress-strain curves of composites beyond the elastic limit. In doing so, several novel methodological approaches were developed, including using the derived material descriptors from the stress-strain curves as interpretable metrics for model performance and dimensionalityreduction techniques to stress-strain curves. This method has the potential to enable composite design with respect to mechanical response beyond the elastic limit, which was previously computationally infeasible, and can generalize easily to related problems outside of microstructural design for enhancing mechanical properties.中文基于卷积神经网络的复合材料微结构应力-应变曲线预测查尔斯,吉姆,瑞恩,格瑞斯摘要应力-应变曲线是材料机械性能的重要代表,从中可以定义重要的性能,例如弹性模量,强度和韧性。
计算机网络实训参考文献

计算机网络实训参考文献
1、《计算机网络》(第 4 版)英文影印版 Andrew S. Tanenbaum
著清华大学出版社
2、《计算机网络》(第 4 版) Andrew S. Tanenbaum 著,潘爱民译清华大学出版社
3、《计算机网络》(第 5 版)谢希仁编著电子工业出版社
4、《计算机网络》(第 2 版) /21 世纪大学本科计算机专业系列教材吴功宜编著清华大学出版社
5、计算机网络:系统方法:(美)彼德森,戴维著,叶新铭等译机械工业出版社
6、计算机网络操作系统原理与应用——全国高等工科教育计算机类规划教材机械工业出版社
7、计算机网络:原理、应用和实现/ 高等学校教材计算机科学与技术王卫亚等主编,李晓莉等编著清华大学出版社
8、计算机网络安全——大学本科计算机专业应用型规划教材顾巧论等编著
9、计算机网络技术与应用董吉文,徐龙玺主编电子工业出版社
10、计算机网络基础应用教程张连永等编著清华大学出版社。
常用十大学术数据库介绍

常用十大学术数据库介绍一、美国(1)Wiley InterScience(英文文献期刊) Wiley InterScience是John Wiely & Sons公司创建的动态在线内容服务,1997年开始在网上开通。
通过InterScience,Wiley公司以许可协议形式向用户提供在线访问全文内容的服务。
WileyInterScience收录了360多种科学、工程技术、医疗领域及相关专业期刊、30多种大型专业参考书、13种实验室手册的全文和500多个题目的Wiley学术图书的全文。
其中被SCI收录的核心期刊近200种。
期刊具体学科划分为:Business,Finance & Management (商业、金融和管理)、Chemistry (化学)、Computer Science(计算机科学)、Earth Science (地球科学)、Education (教育学)、Engineering (工程学)、Law(法律)、Life and Medical Sciences (生命科学与医学)、Mathematics and Statistics(数学统计学)、Physics (物理)、Psychology (心理学)。
(2)美国IEEE (英文文献期刊)IEEE(Institute of Electrical & ElectronicsEngineers)是电子信息领域最著名的跨国性学术团体,其会员分布在世界150多个国家和地区。
据IEEE统计,IEEE会员总数2001年比2000年增加3.1%,达到377342人,其中学生会员为65669人,增长12.6%。
随着人们的信息越来越多地来自Internet,IEEE需要为会员提供更加完善和全面的电子信息产品和服务。
IEEE应成为IEEE会员获得信息的首选之地。
IEEE必须识别正确的信息,并提供对它们的访问方法。
实现这个目标的重要一步是通过IEEEXplore与IEEE/IEE Electronic Library(IEL)连接。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
在IEEE通信学会的主题专家的方向在IEEE ICC这全文论文同行评审的出版2009程序敏感数据要求:做网站询问是否正确?克雷格A.树和Minaxi古普塔计算机科学系印第安纳大学{cshue,minaxi}@摘要:为了确保敏感的Web内容的安全性,一个组织必须使用TLS以确保这样做正确。
然而,很少有人知道如何使TLS实际使用在网站上。
在这项工作中,我们进行大规模的网络范围内的测量,以确定如果网站需要使用TLS的时候,当他们这样做,确保他们使用它正确。
我们发现,其中TLS几十万页要么不使用要么使用不当,将会使敏感数据处于危险之中。
引言该网站提供了电子商务前所未有的机遇。
此类交易的安全性是一般通过使用传输层安全提供性(TLS)协议[1],在标准跟踪安全的后继套接字层(SSL)协议。
TLS允许客户端验证他们访问和服务器的真实性保证在客户端之间的通信的保密性和服务器安全。
虽然以前的工作分析TLS证书和该协议本身,很少的工作重点在其网站上使用。
本文由愿望所驱使,了解TLS是怎么在今天的网络上被使用的。
Web内容的很大一部分是公开可用的,并且不要求保密性。
在很多情况下,如阅读新闻的文章或使用搜索发动机,TLS保护的好处不超过性能开销与该协议有关。
在其他情况下,敏感信息被发送并应通过TLS进行保护。
然而,仅仅使用TLS不够了;它仍然必须正确使用。
调查TLS使用在网络上,我们提出两个主要问题:是否有在网络上的网站,不使用TLS时,他们应注意什么?做到这一点使用TLS这样做正确的网站?动力对于第一个问题是敏感信息可能通过窃听者很容易被截获,除非使用TLS。
第二个问题是通过观察,TLS动机保护必须从Web服务器发送一个表格前到客户端。
否则,将含有一个表格页可以被攻击者改变,允许敏感截取数据。
几大机构,包括,,或,建立了TLS客户端后,保护已下载的网页,但在此之前提交表单数据。
这种做法,被称为安全的岗位,是通常由具有高体积的组织用户流量从未签署到页面上的表单。
此特别常见的,当窗体出现在主一个网站的页面。
这些组织使用安全后,以避免与TLS的nonauthenticating相关的性能开销客户端。
不幸的是,这种做法提供了anopening 攻击者假冒网站和推出 一个中间人攻击的Web 客户端。
为了研究这些安全性差的做法的程度,我们 实现了一个网络爬虫和检查HTML 表单 430万网页。
我们做了几个关键的观察 从这样的分析。
首先,网页31-36%不使用TLS 在所有的时候,他们应该。
为了解决这个问题,我们 已经实现了浏览器扩展,警告用户约 进入网页上做的核潜艇和信用卡号码 除了不使用TLS 来识别领域的询问敏感 数据。
这导致更少的,但更精确的警告。
在 手动评估分机的有效性,我们没有发现假阳性和两种可能的假阴性。
其次,我们发现不安全的网页,有形式,1.65%的 - 4.49%有被通过HTTPS 提交的至少一种形式中, 导致安全交漏洞。
如果剥削,不安全 入口点可能会导致欺诈,可能与显著 财务影响的用户和脆弱的部位。
我们提出了一个浏览器扩展,试图验证这些 使用TLS 提交敏感数据的切入点和 如果这样的验证失败发出警告。
本文的其余部分的结构如下。
在第二节, 我们讨论我们的数据收集和方法。
在第三节, 我们研究的网站,不提供TLS 保护敏感数据并提出了一些预防措施,用户可以利用。
在第 第四,我们分析认为滥用TLS 和建议clientbased 网站 策略来解决这个问题。
我们回顾相关 在第五节工作,并得出结论:在第六节。
II 。
数据收集和方法为了获得对TLS 使用的见解,我们进行了大规模的, Internet 范围的Web 爬行。
我们把我们的抓取成四 数据集,其被选择来捕获不同类型的 网页:热门的网页,这些访问的机器上我们 网络,并且这些随机选择的。
在第一数据集,我们把它称为DMOZ 广度的数据集,我们获得了从一个网址列表 DMOZ 开放目录项目[2]。
DMOZ 的项目包括 形成一个目录查找用户提交的链接的数据,而不是使用一个检索的方法。
数据集,收集在2008年2月13日,载9165163链接。
的这些,4025911联系是独一无二的。
大多数这些链接使用HTTP,HTTPS不,这意味着他们没有使用TLS。
共的2312链接使用TLS。
我们消除这些TLS保护因为在这些任何形式进一步考虑链接网页将牢固地被默认发送。
在courseof几个星期,我们能够以检索总共3213764从DMOZ链接的网页。
这广度为基础的抓取是肤浅的;它只检查直接链接的页面DMOZ。
虽然这种策略让我们的抓取工具来检查从大量的域的页面,它会无法捕捉形式的二级页面。
对于其余的数据集,我们进行了更详细的爬行。
对于每个这些数据集,我们得到一个URL一个首页,下载的网页和链接的任何页面从该页面是一样的DNS域的内原来的页面。
这个更详细的爬行限制的广度域,而发现的形式被直接从挂钩主页。
某些URL可能存在于多个数据集。
由于其独特的爬行方法,我们允许DMOZ宽度数据集与剩余的三个重叠没有试图消除??重叠。
所述第二数据集(DMOZ深度)再次使用从链接在DMOZ开放目录项目。
然而,而thanconduct一个完整的扫描,我们随机选择了16,500独特的链接来执行我们的抓取。
这使我们能够直接比较浅表抓取诗句详细的爬网的策略寻找形式。
我们获得78 726Web从这个抓取网页。
在我们的第三个数据集(Alexa的),我们分析了流行的Web站点。
我们使用的Alexa网络信息服务[3],这居互联网上最流行的Web站点,获取1,000最流行的网站在每个16顶级类别,以及前500个最流行的网站的整体。
有些网站存在于多个类别;在删除重复,我们发现15,341独特的网站。
我们使用的每个站点来自Alexa的获得首发的Web爬行网页。
此爬行导致344,868的网页。
在最后的数据集(DNS),我们针对实际用户行为。
要创建这个数据集,我们捕捉到所有的DNS对于为期一周的发行我们部门的网络上查询期。
我们使用包含在A(地址)的主机名记录查询为基础的Web爬行的URL。
此数据中包含164,145唯一的主机名。
从这个爬行,我们获得642,013的网页。
对于每一个数据集,我们分析每个网页的HTML代码我们下载。
我们使用的形式HTML标记来识别请求数据。
对于每一个表格,我们提取的地址服务的形式,所述形式的目的地,以及页面因为每个相关联的输入域。
从这些数据,我们可以表征数据的类型被发送,以及是否从用户请求的数据将被安全地传送。
我们研究了430万网页。
并非所有weexamined所含形式的网页。
然而,许多页containedmultiple形式,如表Ⅰ所示。
例如,在DMOZ 广度数据集,我们发现,一共有692869(21.55%)页包含总共1710819形式。
使用动作在每个表单标签属性,我们推测,如果正在使用TLS通过寻找HTTPS的存在。
否则,我们推断该形式传输不安全。
在每一个数据集,过95%与形式的网页只包含HTTP(不安全)形式。
数量相对较少,1.65%-4.49%,包含只能通过HTTPS提交表单。
我们注意到,热门的网页,那些在Alexa的数据集,具有页更高百分比表单和一些每页表格较高。
减热门的网页有形式的使用远远低利率。
总的来说,我们的数据包含3,333,646(96.69%),不安全的形式和113,994(3.31%),安全形式。
在接下来的两节中,我们分别检查不安全和安全的方式。
III。
在敏感数据请求TLS我们试图回答第一个问题是:是否有网站在网络上未使用TLS时,他们应注意什么?我们分析所有的333万的形式传输不安全朝着这个目标努力。
表征数据的传输的类型通过下表,我们推测使用的name属性在每个表格输入标记,以及类型属性HTML标记的被使用。
例如,在HTML下面的代码示例中,第三行包含一个输入标签同的类型属性“密码”,这很可能是考虑到Web用户敏感。
我们注意到,3线5,“用户名”和“密码:”只是为标签最终用户知道哪些数据在该领域进入;技术原因,这些目前尚未包括在我们的启发。
<form action=""method="post">Username: <input type="text"name="user"><br>Password: <input type="password"name="pass"><br><input type="submit" name="page"value="Login"></form>我们采用了两个简单的启发式分类材料敏感。
首先,我们检查是否有输入HTML场均型“密码”。
其他启发式是检查任何形式的相关标签的name属性以此来推断它们的用法。
例如,输入与字段“用户”作为名称属性可以推断放置“用户名”,一个数据,我们认为敏感。
与领域“查询”或“搜索”作为名称的属性更likelyto参与网络搜索;我们不认为这数据是敏感的。
我们开发的模式相匹配的值与name属性的表单字段来确定相关的数据请求。
我们进行分类,涉及到用户的数据身份证或户口敏感。
因此,我们认为用户名,密码,账号,地址,(信贷)信用卡号码,电子邮件地址,真实姓名,城市和电话号码是敏感的数据。
一些这方面的信息被认为是比其他数据更敏感。
例如,信用卡信息是可能比一个更敏感电子邮件地址。
然而,电子邮件地址被绑定到用户的身份和可用于跟踪目的。
有些人可能考虑自己的家乡城市是敏感数据,而其他人可能不是。
在这种分析中,我们专注于几件敏感数据,以确定请求的数目为数据,而不是创建一套详尽的敏感数据。
在表二中,我们列出要求敏感数据的类别通过不安全的形式。
每个输入字段进行分类完全通过一系列的规则。
例如,一个场与“密码”的类型属性分类只一个“密码字段,”不管在任何其他比赛中name属性。
然而,一个页面可以有多个类别敏感的表单字段,在这种情况下,它是根据每个计数的类型。
总体而言,我们发现,与网页31.39%-36.00%不安全的形式包含至少一个敏感的领域。
具体来说,我们发现,超过24万的网页包含不安全有输入标签为“密码”的形式类型属性。
每个密码字段导致Web浏览器模糊输入到字段中的文本,以防止他人看到进入用户的屏幕上的数据。
显然,在Web网站认为这个数据是有点敏感,但不它提供了切实的保障。
对领域的类别,其余在表二所列,我们寻找的名称模式输入标签的属性来推断请求的数据的类型。