首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 109 毫秒
1.
网络飞速发展 ,网络安全受到严重威胁 ,网络安全产品应用而生 ,本文在研究了网络安全的有关情况后对网络安全技术进行了探讨 ,介绍了一种简单而实用的网络安全产品  相似文献   

2.
针对网络安全评估存在的不确定性,提出了一种新的基于区间层次分析法的网络安全评估方法.首先建立了多层次的网络安全评估指标体系,然后利用区间层次分析法确定了网络安全评估指标的区间数权重.在此基础上,结合区间数理论建立了基于区间层次分析法的网络安全评估模型.最后结合评估实例对某公司办公自动化网络进行了安全评估,验证了方法的可行性和有效性.  相似文献   

3.
全球网络威胁日趋严峻,作为网络安全事件产生的根源之一,网络安全漏洞越来越被重视,对漏洞的披露已是国家网络安全应急体系建设的重要内容之一。本文构建了网络安全漏洞共享平台、软件厂商及黑客之间的三方博弈模型,并从演化博弈角度对模型进行了分析和数值模拟,确立了稳定均衡点存在的条件。研究结果表明:不同参数初始值对三方博弈结果存在显著差异,软件质量越差,平台越倾向于“封闭披露”策略;对漏洞发现者的支付积极影响软件厂商“注册会员”倾向,对黑客的“努力攻击”倾向产生负面影响;随披露成本的上升,平台更倾向于采纳“封闭披露”策略;预期损失过大,软件厂商倾向于“注册会员”策略。  相似文献   

4.
在滑动式验证码完成滑动验证的过程中,正确区分出操作者是“机器”还是“个人”对于网络安全至关重要.本文利用人和机器完成验证所留下的滑动轨迹提取特征,运用机器学习中的神经网络算法和MATLAB软件对其进行实证研究和分析,建立神经网络分类模型预测验证操作者的类别.结果表明,BP神经网络模型预测准确度很高,在一定程度上为网络安全提供了保障.  相似文献   

5.
互联网上每天充斥着大量入侵与攻击事件,已经严重威胁到网络安全,如何把握网络目前安全态势并预测其发展趋势已成为国内外网络应急响应的热点研究内容之一.根据网络安全事件发生的统计规律性,分别研究了基于时间序列的神经网络和灰色系统理论对未来一段时间内的安全事件数量进行预测的方法,并在此基础上对未来的安全态势进行评估,从而得知网络的整体安全运行状况,有效指导了管理员对网络安全的控制.  相似文献   

6.
网络安全是网络空间安全的一个重要研究领域,网络安全协议则是实现网络安全的核心技术.在2017年最新发布的TLS1.3协议是实现网络安全的一个关键传输层安全协议,因此其安全性受到了人们的广泛关注.为了验证TLS1.3协议的安全性,尤其是秘密性和认证性,尝试基于符号模型,首先基于Applied PI演算对TLS1.3协议进行形式化建模,进而使用非单射性建模认证性,然后将针对TLS1.3协议的Applied PI演算模型转换为安全协议分析工具ProVerif的输入,应用ProVerif对其进行形式化分析,实验结果表明TLS 1.3协议具有良好的认证性和机密性.  相似文献   

7.
产品设计与质量控制的动态因素模型(上)   总被引:2,自引:1,他引:1  
本文介绍产品设计与质量控制的新思想,从产品的设计、生产和使用的角度来研究影响产品质量的所有因素,把它们看成是一个随机过程,提出了动态因素产品设计与质量控制的数学模型。文中把过程能力指数的要领推广到了特性能力指数函数,用于统一地来衡量产品的设计质量、生产质量和使用质量;给出了以特性能力指数函数为变量的产品动态质量损失和产品技术损失的概念,并为组成产品的原材料或零部件达到一致寿命的最经济设计提供了一种理论和方法。  相似文献   

8.
本文以指数分布寿命型电子产品为例,讨论了多源验前信息情况下如何对产品失效率进行融合估计的问题。首先,介绍了寿命试验数据的信息融合方法,并以此为例,说明了取伽玛分布为指数分布寿命型产品失效率的先验分布的合理性。然后,在产品具有多源验前信息源的情况下,给出了一种方便实用的Bayes信息融合方法,充分融合各验前信息,得到产品失效率的验前分布及后验分布。最后给出了数值实例。  相似文献   

9.
本文介绍概率抽样法在钢球生产过程中的应用,通过此法确定钢球生产中各工序质量监测的最佳抽检方案,以确保产品被接受的概率最大。  相似文献   

10.
<正> 有效度是可修复产品的一个重要的可靠性指标。如果产品的寿命和修复时间都服从指数分布,则可修复产品的状态可用马尔可夫过程来描述,因而其有效度的计算公式也可用马尔可夫过程导出。本文介绍只用概率论知识导出的方法,供参考。  相似文献   

11.
In this paper, we deal with multicriteria matrix games. Different solution concepts have been proposed to cope with these games. Recently, the concept of Pareto-optimal security strategy which assures the property of security in the individual criteria against an opponent's deviation in strategy has been introduced. However, the idea of security behind this concept is based on expected values, so that this security might be violated by mixed strategies when replications are not allowed. To avoid this inconvenience, we propose in this paper a new concept of solution for these games: the G-goal security strategy, which includes as part of the solution the probability of obtaining prespecified values in the payoff functions. Thus, attitude toward risk together with payoff values are considered jointly in the solution analysis.  相似文献   

12.
Nowadays, embedded network products are widely used in various technological fields. However, when such products are used, the transmission of network data could not be guaranteed with high security. To address the issue, this paper designed a network encryption machine based on S3C6410 processor and DM9000 Ethernet controller. The hardware circuit of this encryption machine is designed and developed with conciseness and stability. In software design, an improved algorithm of chaotic encryption based on Henon mapping is proposed. The algorithm overcomes the shortcoming in combining Logistic and Tent chaotic sequences. Moreover, the paper demonstrates some comparative experiments about autocorrelation and randomness. The results indicate that the new algorithm based on Henon chaotic sequences has a good performance in safety and is able to meet the requirements of confidential communications.  相似文献   

13.
基于城乡物流一体化的目标设定和相应基础设施平台的支持,提出连锁经营配送网络的建设模式,依据对当前连锁经营网络发展的重点工作的分析,建立了关于配送中心和农产品收购中心选择的网络优化模型.并引入算例说明模型的可行性和适用性.  相似文献   

14.
This paper discusses and extends some competitive aspects of the games proposed in an earlier work, where a robust railway network design problem was proposed as a non-cooperative zero-sum game in normal form between a designer/operator and an attacker. Due to the importance of the order of play and the information available to the players at the moment of their decisions, we here extend those previous models by proposing a formulation of this situation as a dynamic game. Besides, we propose a new mathematical programming model that optimizes both the network design and the allocation of security resources over the network. The paper also proposes a model to distribute security resources over an already existing railway network in order to minimize the negative effects of an intentional attack. For the sake of readability, all concepts are introduced with the help of an illustrative example.  相似文献   

15.
ZHANGXIANGSUN(章祥荪)(InstituteofAppliedMathematicstheChineseAcademyofSciences,Beijing100080,China)ReceivedJune18,1994.Thisworki...  相似文献   

16.
分配网络流广泛应用于解决水源、电力的调度及工厂的产品运输、分配、合成等问题.本文提出一个分配网络流的最小费用流算法.  相似文献   

17.
The study of network reliability started in 1956 with a groundbreaking paper by E.F. Moore and C.E. Shannon. They introduced a probabilistic model of network reliability, where the nodes of the network were considered to be perfectly reliable, and the links or edges could fail independently with a certain probability. The problem is to determine the probability that the network remains connected under these conditions. If all the edges have the same probability of failing, this leads to the so-called reliability polynomial of the network. Sixty years later, a lot of research has accumulated on this topic, and many variants of the original problem have been investigated. We review the basic concepts and results, as well as some recent developments in this area, and we outline some important research directions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号