期刊文献+

网络空间战场态势感知影响因素研究 被引量:2

Influence Factors of Cyberspace Battlefield Situation Awareness
下载PDF
导出
摘要 为加强网络空间战场态势感知系统建设,实时感知战场作战情况,结合战场态势感知过程和感知机理,对影响网络空间战场态势感知的相关因素展开研究。重点分析人因对网络空间战场态势的决定性影响,数据和信息不确定性对态势感知影响的表现形式和成因,信息融合、人工智能、计算可视化等技术瓶颈对态势生成处理的影响,对在网络空间战场中运用相关影响因素提出了建议,以期为指挥决策人员正确认知和理解网络空间战场态势提供有益借鉴。 To strengthen the construction of cyberspace battlefield situation awareness system and real-time perception of the battlefield situation, in combination of the battlefield perception with the perception mechanism, the related factors of influence on cyberspace situational awareness is studied, with focus on the analysis of human factor the decisive influence on cyberspace battlefield situation, the impact of data and information uncertainty on the situational awareness manifestations and causes, and the effects of information fusion, artificial intelligence, calculation visualization and other technical bottlenecks on the situation generating and processing, some suggestions are put forward for the application of relevant influencing factors in the cyberspace battlefield, in hope of providing a useful reference for the commanders and staff to correctly cognize and understand the cyberspace battlefield situation.
机构地区 西安通信学院 [ [
出处 《通信技术》 2016年第12期1676-1679,共4页 Communications Technology
关键词 网络空间 态势感知 影响因素 技术瓶颈 cyberspace situational awareness influencing factor technical bottleneck
  • 相关文献

参考文献3

二级参考文献14

  • 1孙健,王韬,李东强.病毒防护技术的研究[J].科学技术与工程,2005,5(21):1648-1650. 被引量:27
  • 2王宏伟.网络安全威胁与对策[J].科技创业月刊,2006,19(5):179-180. 被引量:87
  • 3夏丹丹,李刚,程梦梦,于亮.入侵检测系统综述[J].网络安全技术与应用,2007(1):35-36. 被引量:37
  • 4BASS T,GRUBER D.A glimpse into the future of id[EB/OL].(1999-11-16)[2007-04-20].http://www.usenix.org/publications/login/1999-9/features/future.html.
  • 5Carnegie Mellon's SEI.System for Internet Level Knowledge (SILK)[EB/OL].[2007-04-20].http://silktools.sourceforge.net.
  • 6SHIFFLET J.A technique independent fusion model for network intrusion detection[C]// Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics.2005,3(1):13-19.
  • 7YURCIK W,BARLOW J,LAKKARAJU K,et al.Two visual computer network security monitoring tools incorporating operator interface requirements[C]// ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC).New York:ACM Press,2003:54.
  • 8LAU S.The spinning cube of potential doom[J].Communications of the ACM,2004,47(6):25-26.
  • 9YURCIK W.Visualizing netflows for security at line speed:the SIFT tool suite[C/OL]// 19th Usenix Large Installation System Administration Conference(LISA),San Diego,2005.http://www.usenix.org/events/lisa05/tech/full_papers/yurcik/yurcik.pdf.
  • 10北京理工大学信息安全与对抗技术研究中心.网络安全态势评估系统技术白皮书[EB/OL].[2007-04-20].http://www.thinkor.com/product/download/网络安全态势评估系统技术白皮书2.doc.

共引文献242

同被引文献14

引证文献2

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部