期刊文献+

海上编队信息系统安全防护需求分析 被引量:3

Analysis of Security Protection Requirements for Naval Battle Group Information System
下载PDF
导出
摘要 未来海上编队作战对各类信息系统的依赖性越来越强,信息系统也将成为敌对双方攻击的重点,因此编队信息系统的安全问题直接关系到编队指挥控制信息的安全可靠和编队信息化主战武器的性能发挥,影响到编队整体作战能力。文章在对编队信息系统面临的安全威胁和存在的安全风险进行分析的基础上,提出了编队信息系统的安全防护需求,为编队信息系统安全防护系统的构建提供依据。 The naval battle group will more and more depend on various information systerrks in the future combat. The information systems will be mostly attacked by enemy. Therefore, the security of naval battle information systems will relate to the security reliability of command and control information, and to the performance exertion of information-based weapons Furthermore, it can influence the whole combat capability of the naval battle group. The security protection requirements for naval battle group information system is researched in the paper. Firstly, the security threat and the security risk in the naval battle group information system are analysed. Then, the security protection requirements are proposed, which can provide basis for the foundation of security protection system of naval battle group information system.
作者 解绍梅 郝威
出处 《舰船电子工程》 2013年第1期20-22,共3页 Ship Electronic Engineering
关键词 海上编队 信息系统 安全防护 需求 naval battle group, information system, security protection, requirement
  • 相关文献

参考文献9

二级参考文献19

  • 1刘渊,熊育.基于智能模型的入侵检测技术与方法研究[J].舰船电子工程,2008,28(7):139-142. 被引量:2
  • 2朱建冲,杨美玲,屠永宁.从网络中心战构想思考我海军信息化建设[J].海军工程大学学报(综合版),2005,2(3):43-46. 被引量:2
  • 3何波,程勇军,涂飞,杨武.自适应入侵检测专家系统模型[J].计算机工程,2007,33(10):158-160. 被引量:6
  • 4蒋金山,何春雄,潘少华.最优化计算方法[M].广州:华南理工大学出版社,2007.
  • 5DoD. Report to Congress: Network Centric Warfare [R]. Washington D. C. : Department of Defense United States of America, 2001.
  • 6ZHU X J. Anomaly detection through statistics based machine learning for computer networks[D]. Tucson: The University of Arizona, 2006.
  • 7JING X P, WANG H X, HAN R F. Improved Genetic Algo- rithm in Intrusion Detection Model Based on Artificial Immune Theory[C]//The 1st IEEE International Symposium on Com- puter Network and Multimedia Technology, Wu Han, China: IEEE Press, 2009 : 659-962.
  • 8HAN R F, WANG H X, Xiao Q. Service oriented decentral- ized access control for military systems in Net-Centric Environ- ment[C]//The 2nd International Symposium on Electronic Commerce and Security, 2009,5 : 209-214.
  • 9HAN R F, WANG H X, XIAO Q. A united access control model for systems in collaborative commerce[J]. Journal of Networks, 2009 (6): 279-289.
  • 10王凌.智能优化算法及其应用[M].北京:清华大学出版社,2003..

共引文献47

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部