期刊文献+

信息采集技术在模拟训练中的应用 被引量:4

Information Collection Technology for Simulation Training
下载PDF
导出
摘要 针对模拟训练软件的研发复杂、培训成本增高问题,将计算机黑客技术应用于业务软件信息采集系统。在增加少许业务软件分析工作量的条件下,实现了模拟训练软件的通用化,在友好协作条件下实现了领域业务软件的训用统一,对提高训练效果有较大促进作用。 To solve the problems of the high development complexity and high cost of the simula- tion training software, the hacker technologies are applied to the operational software information system. With some increase of the operational software analysis load, the simulation training software can be universally used. In a cooperation environment, the operational software can realize the functions for training and using, thus improving the training effect.
出处 《指挥信息系统与技术》 2012年第2期67-71,共5页 Command Information System and Technology
关键词 模拟训练 信息采集 软件行为 HOOK技术 simulation training information collection software behavior Hook technology
  • 相关文献

参考文献6

二级参考文献20

  • 1李元良,黄强.远程线程注入技术的实现[J].矿业研究与开发,2006,26(3):77-78. 被引量:2
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:356
  • 3龙启明,刘斌,程捷.Delphi高级编程范例[M].北京:清华大学出版社,2003.
  • 4Cicotti P, Taufer M, Chien A A. DGMonitor: A Performance Monitoring Tool for Sandbox- Based Desktop Grid Platforms [J ]. The Journal of Supercomputing,2005,34:113 - 133.
  • 5Rashidzadeh R,Ahmadi M, MiUer W C. On- chip measurement of waveforms in mixed-signal circuits using a segmented subsampling technique[J]. Analog Integr Cite Sig Process, 2007,50:105 - 113.
  • 6李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 7Trusted Computing Group. TCG specification architecture overview [EB/OL]. [2005-03-01]. https:// www. trustedcom putinggroup, org/.
  • 8Kim G, Spafford E. The design and implementation of tripwire :A file system integrity checker[R]. West Lafayette: Purdue Univiversity, 1993.
  • 9Arbaugh W,Farber D,Smith J. A secure and reliable bootstrap architecture [C]//Proceedings the IEEE Symposium on Security and Privacy, Oakland:IEEE Computer Society, 1997.
  • 10Iglio P. Trustedbox..A Kernel-level integrity checker [C]//ACSAC ' 99: Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix: IEEE Computer Society,1999.

共引文献48

同被引文献31

  • 1刘兵,郑怀洲,肖东昀.装备指挥训练模拟数据收集系统研究[J].系统仿真学报,2006,18(z2):246-249. 被引量:4
  • 2夏永春,吴东亚,尹光洪.指控系统验证相关问题研究[J].装甲兵工程学院学报,2013,27(4):65-69. 被引量:3
  • 3于志坚.我国航天测控系统的现状与发展[J].中国工程科学,2006,8(10):42-46. 被引量:64
  • 4倪步喜.Windows的钩子技术及实现[J].计算机与现代化,2007(1):28-30. 被引量:11
  • 5尹朝庆.人工智能与专家系统[M].北京:中国水利水电出版社,2009.
  • 6Kass R A,Alberts D S,Hayes R E.作战试验及其逻辑[M].马增军,孟凡松,译.北京:国防工业出版社,2010.
  • 7Binnig C, Kossmann D, Lo E, et al. QA-Gen: generating query-aware test databases [C]//Proeeedings of the 2007 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2007.
  • 8Binnig C, Kossmann D, Lo E. Reverse query processing [C] ///Proceedings of IEEE 23rd International Conference on Data Engineering. Washington D. C. : IEEE, 2007.
  • 9Binnig C, Kossmann D, Lo E. Multi-RQP generating test databases for the functional testing of OLTP applications [C]//Proceedings of the 1st International Workshop on Testing Database Systems. New York: ACM, 2008.
  • 10EricColeNetworkSecurityBible,2ndEdition[M].北京:清华大学出版社,2010:99—111.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部