期刊文献+

“舒特”攻击行动描述与效能评估探要 被引量:2

Action Description and Effectiveness Evaluation of Suter Attacks
下载PDF
导出
摘要 文章基于UML概念建模语言对"舒特"攻击行动进行了形式化描述,构建了"舒特"攻击行动效能评估指标体系,运用模糊层次分析法对"舒特"攻击行动的效能进行了评估,同时给出了应对"舒特"攻击的建议。 This paper gives the formal description of suter attacks based on UML conceptual modeling language, designs the effectiveness evaluation index system of suter attacks, evaluates the effectiveness of suter attacks by synthesizing fuzzy analytic hierarchy process mothods, and lists some suggestions to counterstroke suter operations.
出处 《信息网络安全》 2014年第4期7-12,共6页 Netinfo Security
关键词 “舒特”攻击行动 形式化描述 评估指标体系 效能评估 suter attacks formal description evaluation index system effectiveness evaluation
  • 相关文献

参考文献12

  • 1MATT. What is Suter. [EB/OL] .http://www. 191 3inteLcom/2007/10/05/what—is—suter/,2007—10—05.
  • 2Wikipedia.Big safari [EB/OL] .http://en.wikipedia.org/wiki/Big_Safari,2009—9-15.
  • 3马林立.外军网电空间战现状与发展[M].北京:国防工业出版社,2012.
  • 4LARRY BOND. Israel . s First Strike on Iran, s NuclearFacilities[EB/OL]. http://www.defensemedianetwork.com/stories/first—strike—on—irans—nuclear—facilities—part—1/,2013-7-13.
  • 5范勇,李为民.军事概念建模形式化描述语言比较分析[J].火力与指挥控制,2006,31(6):19-22. 被引量:20
  • 6董尤心.效能评估方法研究[M].北京:国防工业出版社,2009.
  • 7许抗,胡德峰,顾敬民.警惕!“舒特”攻击系统[J].军事文摘,2010,(06): 57-60.
  • 8宋保军.美军舒特系统初探[J].外军信息战.2011(2):22-24.
  • 9朱松,王燕.舒特?舒特![J].国际电子战,2010,( 07 ) : 25-36.
  • 10徐松,黄谦.“舒特”系统的体系结构模型探析[M].北京:蓝天出版社,2010.

二级参考文献10

共引文献236

同被引文献50

  • 1王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 2马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 3吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 4Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 5Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 6Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 7Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 8Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.
  • 9Schulze C, Schreyer M,Stahl A, et al. Using DCT Features forPrinting Technique and Copy Detection[J]. Advances in Digital Forensics,2009, (306): 95-106.
  • 10Shang S,Memon N, Kong X. Detecting documents forged byprinting and copying[J]. EUR.ASIP Journal on Advances in SignalProcessing, 2014, 140.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部