期刊文献+

基于序列两两对比的软件行为踪迹分析

SOFTWARE BEHAVIOUR TRACE ANALYSIS BASED ON SEQUENCE PAIRWISE CONTRAST
下载PDF
导出
摘要 针对以往的软件序列对比操作过程复杂,以及对比算法的时空复杂度不如人意等的问题,提出一种针对软件行为踪迹分析的序列两两对比算法,该方法在兼顾分析效率的同时达到分析的准确性。实验结果表明,基于被研究的序列对比算法在分析行为序列的效率和准确性上具有综合优越性。 Aiming at the problems that the previous software sequence contrast had complex process in operation and the spatiotemporal complexity of its contrast algorithm was less satisfactory,in this paper we put forward a sequence pairwise contrast algorithm for software behaviour trace analysis.The method achieves the goals in both efficiency and accuracy of analysis.Experimental results show that the sequence contrast algorithm based on the study in this article has comprehensive superiority in efficiency and accuracy of behaviour sequences analysis.
作者 陈翼鹰 黄斐
出处 《计算机应用与软件》 CSCD 北大核心 2013年第4期174-176,260,共4页 Computer Applications and Software
关键词 软件行为 行为踪迹分析 序列两两比较算法 Software behaviour Behaviour trace analysis Sequence pairwise comparison
  • 相关文献

参考文献10

二级参考文献31

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 4林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 5Ruohomaa S,Kutvonen L.Trust management survey//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:77-92
  • 6Theodorakopoulos,George,Baras,John S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
  • 7Pal P,Webber F,Atighetchi M,Combs N.Trust assessment from observed behavior:Toward and essential service for trusted network computing//Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2006:285-292
  • 8Ciaran B,Karl K,Jean-Marc S,Vinny C.Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:289-304
  • 9Tian Li-Qin,Lin Chuang,Ji Tie-Guo.Kind of quantitative evaluation of user behaviour trust using AHP.Journal of Computational Information Systems,2007,3(4):1329-1334
  • 10Lin Ai-Zhong,Vullings E,Dalziel J.A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops.Changsha,China,2006:557-564

共引文献317

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部