首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
构建云计算网络下的安全等级评估模型,提出一种基于模糊集和粗糙集数据挖掘的云计算网络下安全等级评估算法,实现对云计算和云存储的安全综合评估和预测。结果表明,采用该安全等级评估模型,具有较好的数据监测和挖掘能力,有效实现对云计算网络的危险数据和病毒检测,性能较好,保证了网络安全。  相似文献   

2.
凡静  李娜 《科技通报》2023,(6):35-39
多节点网络产生的数据量巨大,无法保证评估结果精准。本文提出基于并行约简的多节点网络安全态势评估方法。提取多节点网络安全态势因素,构建基于并行约简的评估模型,剔除冗余属性,获取信息融合后的网络攻击模式。根据信息融合进程,将全部数据分配到各个并行处理的进程中,计算初始化局部约简集、核心属性集的安全态势评估指数。结合主机节点的安全状态和权重,融合多个节点态势。从热源节点出发,构建最简攻击图,计算安全事件关联度函数,判断攻击事件是否安全。累计每次攻击主机节点的影响,计算安全态势值,评估多节点网络安全态势。实验结果表明,该方法与预期评估结果存在0.02的最大误差,具有精准评估结果。  相似文献   

3.
王玲 《科技通报》2012,28(8):107-109,113
针对当前预测模型只能对过去和现在网络安全态势进行分析,不能对将来网络安全态势进行预测的缺陷,提出了预见式关联规则的网络安全态势预测方法。该方法能够利用当前和过去的数据对事物进行一定程度地预测,通过将其应用到网络财务系统中,并且采用小区域聚类的方法对关联规则进行一定程度地约束。通过仿真对预测方法性能进行检验。结果表明,预测方法能够准确反映网络财务系统安全形势的变化趋势,提高了系统的预测精度,相对于传统预测方法,更适用于现实的网络财务系统环境。  相似文献   

4.
对网络攻击信号检测中,需要对网络威胁态势预测的抗体虚警概率阈值估计,提高攻击信号检测性能。传统方法采用伪随机时频跳变的信息容量估计方法实现阈值估计和攻击信号检测,当攻击信号为非线性谐振信号时,检测性能不好。提出一种改进的网络威胁态势预测的抗体虚警概率阈值估计算法。构建多路复用器输入输出网络威胁态势预测算法,通过病毒信息特征预处理为免疫性分析提供信息特征数据基础。得到网络跳变向量和观测向量的标准正态阈值,将网络接收端和发送端数据的信息熵作为信道传递向量函数,在人工免疫进化过程中实现对免疫节点的抗体的虚警概率阈值估计,提高网络攻击信号的检测性能,降低网络威胁态势抗体虚警概率。仿真实验得出,该算法得到的估计结果精确,有效提高了攻击信号的检测性能,确保网络安全。  相似文献   

5.
为了提高网络安全态势的预测准确性,提出一种改进布谷鸟搜索算法和正则极限学习机相融合的网络安全态势预测模型。首先将一维的网络安全态势数据重构成多维时间序列,然后将训练样本集输入到正则极限学习机进行学习,并采用改进布谷鸟搜索算法优化输入权值和隐含层阈值,建立网络安全态势预测模型,最后采用Honeynet数据集对模型性能进行测试。结果表明,相对于其它网络安全态势预测模型,本文模型可更加准确描述网络安全态势的变化趋势,不仅提高了网络安全态势预测准确性,而且加快了建模速度,可以满足网络安全态势在线预测要求。  相似文献   

6.
郑晓霞  聂阳  戈华 《科技通报》2015,(2):188-190
在网络切换和数据通信中,会产生一种伪随机时频跳变网络谐振信号,需要对这种谐振信号进行信号抑制,提高网络的安全性和稳定性,对网络谐振信号的信息容量估计是实现谐振信号抑制的基础。提出一种基于人工免疫的伪随机时频跳变网络谐振信号的信息容量估计算法,首先进行伪随机时频跳变网络系统的总体设计,计算网络跳变信号在人工免疫进化过程中免疫节点的位置和尺度参数,引入自适应转发控制策略,构建数据信息链优先链路选择准则,预测信号的下一个跳变点,得到多路复用波束域约束指向形成信号容量的输出结果,通过对信号容量的准确估计,可以避免网络出现启动滞后、服务器负载、消息消耗以及颤抖等现象。实验结果表明,该算法对伪随机时频跳变网络谐振信号的信息容量估计精度高,抑制性能和检测性能较好,确保了网络系统的稳定。  相似文献   

7.
大数据环境下网络风险评估具有多数据源的特点,导致传统的基于神经网络的网络风险评估模型,由于未对多元数据分类而无法实现网络风险评估,提出一种基于信息融合的大数据环境下网络风险评估模型,将检测结果汇总后获取综合攻击发生概率,选用优化的D-S证据理论方法对相关检测设备的mass函数值进行合成并完成数据源的融合,然后求出攻击发生支持概率,依据态势要素融合求出每个主机节点的网络风险态势,通过态势要素融合求出主机节点的网络风险态势,再根据每个主机节点的安全态势得出每个节点权重的融合,获取网络风险态势值,利用数据源融合、态势要素融合以及节点态势融合获取网络风险态势值,在此基础上分析网络风险评估模型。仿真实验结果表明所提方法具有很高的精度。  相似文献   

8.
高速移动场景下的无线网络覆盖已经成为移动网络建设的重要组成部分,传统的移动节点衰减模型,由于其在计算的准确性和反应速度方面存在着一定的局限性,无法得到理想的衰减信道。为此,提出建立高速环境下移动节点衰减性能检测模型。新型高速环境下移动节点衰减性能检测模型通过测算大差分衰落特性,对高速移动环境下通信节点接收信号幅值强度进行计算,为高速铁路建网前期通信节点的建设规划和后期网络运行提供准确的基础数据。通过提高外置车顶天线的接收性能,减少测量过程中因速度的改变和场景的变化而造成的通信节点衰减性能的下降幅度。通过对高速移动场景下多尺度、多角度衰落系数的修订,消除地貌环境的影响,最终推衍出综合检测模型。仿真结果表明,新型的通信节点性能检测模型最终可将高速移动环境下的移动通信节点衰减性能检测参数计算的精准率提高20%。  相似文献   

9.
在计算机技术的快速发展下,计算机网络也变得愈加庞大,各种应用系统也愈加复杂化。与此同时,各种网络安全事件也频频发生,也让计算机网络的信息安全形势日益严峻。为满足当前网络信息安全的要求,网络安全态势评估技术应运而生,该技术能对影响网络信息安全的各方面因素进行综合分析,对网络安全状况进行动态的反映,预测其发展趋势。本文重点分析了建立在性能修正、日志审计算法基础上的一种网络安全态势评估模型,以及该网络安全态势评估模型对网络安全态势趋势的预测。  相似文献   

10.
设计高速网络流路由修复算法,提高网络的生命周期,降低路由节点能耗。传统的路由修复算法采用阈值分割路由冲突分解算法,采用阈值分割判断实现路由修复,无法有效满足高速网络流路由修复的应用环境。提出一种基于断点损耗预测的高速网络流路由修复方法。计算通信节点的衰减性能,绘制出符合高速移动环境移动节点衰减曲线,根据欧氏距离公式计算出随机分布的路由节点的路径链接的稳定性,对多角度系数进行修订,采用断点损耗预测方法,进行功耗损失修订,实现路由修复。仿真实验表明,该算法实现高速网络流路由修复。有效地控制簇头的数量和分布、节约能量、均衡网络负载,提高了高速网络流路由的生命周期,单个节点能耗大幅降低,在高速移动大规模网络流维护和路由控制优化中具有较好的应用价值。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

15.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

16.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

17.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

18.
<正>In Xishuangbanna,one of China’s most biodiverse regions,landscape has changed dramatically during the past three decades due to the conversion of tropical rainforest to rubber plantations.In steep areas,terraces are often constructed before planting rubber trees,which causes two important changes in the soil:the destabilization of soil in the bench terraces and the increased vulnerability of unvegetated riser faces to erosion.Few studies have documented the nature and intensity of erosion on bench terraces.Prof.LIU Wenjie and his colleagues from the Xishuangbanna Tropical Botanical Garden(XTBG)conducted a study in Menglun County(21°5′39″N,101°15′55″E),Xishuangbanna to evaluate the influence  相似文献   

19.
<正>Chinese scientists plan to apply Earth Observation technologies to protect the critically endangered wild camels(Camelus ferus).With the help of remote sensing,satellite positioning,geographical information system and wireless sensors networks,they will be able to access the distribution and population of the wild camels and protect their habitats.The project will be carried out by the International Research Center for Wild Camel Conservation,which was jointly established earlier this year by the Institute of Remote Sensing and Digital Earth(RADI)of the Chinese  相似文献   

20.
<正>The Paul Gerson Unna Research Group on Dermatogenomics was founded in October 2012 at the Partner Institute for Computational Biology.The ultimate goal of the group is to understand the biology of skin and skin appendages.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号