排序方式: 共有90条查询结果,搜索用时 109 毫秒
31.
介绍了Internet上常见的一种恶意攻击——强行将自己的网站设为首页,控制网页访问的优先权;并且介绍了这种恶意攻的应对办法。 相似文献
32.
移动无线自组织网络(Mobile Ad Hoc Network,MANET)具有抗毁性强、组网灵活的特点,战场通信环境是其很重要的应用背景,基于距离向量的按需路由协议(Ad-hoc On-demand Vector Routing,AODV)在移动无线自组织网络中具有广泛的应用。针对移动无线自组网AODV路由协议,在分析其工作原理的基础上,建立网络流量的分析模型。从网络发起泛搜索路由引起网络流量变化的角度,分析不同的协议攻击方法对网络的影响。 相似文献
33.
34.
35.
36.
37.
专家系统在空战多目标攻击排序中的应用 总被引:5,自引:2,他引:3
根据现代空战的特点,提出应用专家系统进行空战的多目标攻击排序,介绍了专家系统的基本思想和基本结构,构造了专家系统的知识库和推理机,并就1对4的攻击排序进行了仿真研究。最后,对该方法在提高空战效率和排序实时性方面的优势进行了分析。 相似文献
38.
本文指出"混沌非线性反馈密码序列的理论设计和有限精度实现"和"一类新型混沌反馈密码序列的理论设计"两文基于混沌设计的两个序列密码算法产生的乱数序列的前若干值对密钥的变化并不敏感,据此在已知混沌变换的条件下,可以利用已知明文采取先攻击高位密钥再攻击低位密钥的方法对这两个密码算法进行分割攻击.本文还提出了在正确密钥的分布已知条件下使平均计算复杂性达到最小的穷举攻击算法,并将它与分割攻击方法结合,提出了对上述两个密码算法的优化分割攻击方案,并分析了这两个攻击方案的计算复杂性和成功率. 相似文献
39.
Shashibhushan Sharma Sanjay Dhar Roy Sumit Kundu 《International Journal of Communication Systems》2019,32(3)
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work. 相似文献
40.