Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tianbo Lu is active.

Publication


Featured researches published by Tianbo Lu.


international conference on social computing | 2013

Next Big Thing in Big Data: The Security of the ICT Supply Chain

Tianbo Lu; Xiaobo Guo; Bing Xu; Lingling Zhao; Yong Peng; Hongyu Yang

In contemporary society, with supply chains becoming more and more complex, the data in supply chains increases by means of volume, variety and velocity. Big data rise in response to the proper time and conditions to offer advantages for the nodes in supply chains to solve prewiously difficult problems. For any big data project to succeed, it must first depend on high-quality data but not merely on quantity. Further, it will become increasingly important in many big data projects to add external data to the mix and companies will eventually turn from only looking inward to also looking outward into the market, which means the use of big data must be broadened considerably. Hence the data supply chains, both internally and externally, become of prime importance. ICT (Information and Telecommunication) supply chain management is especially important as supply chain link the world closely and ICT supply chain is the base of all supply chains in todays world. Though many initiatives to supply chain security have been developed and taken into practice, most of them are emphasized in physical supply chain which is addressed in transporting cargos. The research on ICT supply chain security is still in preliminary stage. The use of big data can promote the normal operation of ICT supply chain as it greatly improve the data collecting and processing capacity and in turn, ICT supply chain is a necessary carrier of big data as it produces all the software, hardware and infrastructures for big datas collection, storage and application. The close relationship between big data and ICT supply chain make it an effective way to do research on big data security through analysis on ICT supply chain security. This paper first analyzes the security problems that the ICT supply chain is facing in information management, system integrity and cyberspace, and then introduces several famous international models both on physical supply chain and ICT supply chain. After that the authors describe a case of communication equipment with big data in ICT supply chain and propose a series of recommendations conducive to developing secure big data supply chain from five dimensions.


intelligent information hiding and multimedia signal processing | 2013

Security Analysis on Cyber-physical System Using Attack Tree

Feng Xie; Tianbo Lu; Xiaobo Guo; Jingli Liu; Yong Peng; Yang Gao

Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and peoples livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS always focuses on the reliability assessment, using Probability Risk Assessment (PRA). In this way, the assessment of physical part and cyber part is isolated as PRA is difficult to quantify the risks from the cyber world. Methodologies should be developed to assess the both parts as a whole system, considering this integrated system has a high coupling between the physical layer and cyber layer. In this paper, a risk assessment idea for CPS with the use of attack tree is proposed. Firstly, it presents a detailed description about the threat and vulnerability attributes of each leaf in an attack tree and tells how to assign value to its threat and vulnerability vector. Then this paper focuses on calculating the threat and vulnerability vector of an attack path with the use of the leaf vector values. Finally, damage is taken into account and an idea to calculate the risk value of the whole attack path is given.


international conference on advanced computer control | 2011

Analysis of security standardization for IPTV

Tianbo Lu; Feng Xie; Yong Peng; Jin Xie

Internet Protocol Television (IPTV) is a critical service in converged networking environment. It promises to deliver a world of content and services to “any device, anywhere, anytime.” The number of global IPTV subscribers is expected to grow from 28 million in 2009 to 83 million in 2013, and the global IPTV market revenues are forecasted to grow from US


asia-pacific services computing conference | 2012

Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management

Feng Xie; Tianbo Lu; Bing Xu; Dongqing Chen; Yong Peng

12 billion in 2009 to US


intelligent information hiding and multimedia signal processing | 2013

Cyber-physical System Risk Assessment

Yong Peng; Tianbo Lu; Jingli Liu; Yang Gao; Xiaobo Guo; Feng Xie

38 billion in 2013. However, IPTV must offer secure and reliable delivery to subscribers of entertainment video and related services. This article discusses published specifications and ongoing activities on IPTV security in main standards organizations, including ITU-T IPTV FG, ETSI TISPAN, DVB, ATIS, OIPF and CCSA.


Archive | 2015

Towards Attacks and Defenses of Anonymous Communication Systems

Tianbo Lu; Puxin Yao; Lingling Zhao; Yang Li; Feng Xie; Yamei Xia

Software assurance in software development process becomes an important part of ICT supply chains risk management, and also has been one of the most advanced information security technologies. Based on the researches of software assurance, this paper studies the development and current research of software security assurance in the background of software security being concerned by more and more people, then proposes a software security assurance model in software development process based on SDLC model, summarizes security activities during the development phase, analyzes the risk management of software assurance. Finally, the paper also indicates new research directions.


Lecture Notes in Engineering and Computer Science | 2013

Towards An Analysis of Software Supply Chain Risk Management

Shixian Du; Tianbo Lu; Lingling Zhao; Bing Xu; Xiaobo Guo; Hongyu Yang


International journal of security and its applications | 2016

A Systematic Review of Network Flow Watermarking In Anonymity Systems

Tianbo Lu; Rui Guo; Lingling Zhao; Yang Li


International journal of security and its applications | 2015

A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields

Tianbo Lu; Jiaxi Lin; Lingling Zhao; Yang Li; Yong Peng


international workshop on security | 2014

An Analysis of Cyber Physical System Security Theories

Tianbo Lu; Jiaxi Lin; Lingling Zhao; Yang Li; Yong Peng

Collaboration


Dive into the Tianbo Lu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yong Peng

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hongyu Yang

Civil Aviation University of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Puxin Yao

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge