期刊文献+

基于多Agent的Internet信息涉密检查系统 被引量:7

Multi-Agent-based Internet Information Secret-related Inspecting System
下载PDF
导出
摘要 该文给出了基于多Agent的Internet信息涉密检查系统(IISIS)的设计方案,详细论述了IISIS体系结构、Agent角色分配、能力结构以及IISIS中多Agent协作协调算法。该系统可以有力配合保密部门针对Internet信息服务器进行高效快速的涉密检查,其实用性已得到实践验证。 The solution of multi-agent -based Internet Information Secret-related Inspecting System(IISIS)is presented.The IISIS architecture,agent roles,capability structures and multi-agent cooperation and coordinating algorithm in IISIS are described in detail.The system has been being used in secret sections to inspect Internet information,whose efficiency has been proved by practice.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第9期150-151,162,共3页 Computer Engineering and Applications
基金 黑龙江省科技厅青年基金资助(编号:Q00C037)
关键词 多AGENT INTERNET信息 涉密检查 multi-agent ,Internet information,secret-related inspecting
  • 相关文献

参考文献5

二级参考文献6

共引文献99

同被引文献30

  • 1杨义先.网络文化安全综论[EB/OL].[2(107-10-12].http.//www.cnhubei.com/200503/ca765740.htm.
  • 2Charles P. Plleeger, Shari Lawrence Plleeger. Security in Computing [ M]. Tokyo:Pearson Education Asia Limited,2007:150 -154.
  • 3王景中.计算机通信信息安全技术[M].北京:清华大学出版社,2005:110-112.
  • 4Michael E. Whitman, Herbert J. Mattord. Principles of Information Security [ M ]. New York: Thomson Learning, 2004: 207-209.
  • 5Neil Desail.Increasing Performance in High Speed NIDS[EB/OL].http://www.linuxsecurity.com/resource.files/instrusion-detecttion/increasing-performance-in-high-speed-NIDS.pdf,2003-01.
  • 6Boyer RS,Moore JS.A Fast String Searching Algorithm[J].Communications of the ACM,1977,20:762-772.
  • 7Aho AV,Corasick MJ.Efficient String Matching:An Aid to Bibliographic Search[J].Communications of the ACM,1975,18:333-340.
  • 8Commentz-Walter B.A String Matching Algorithm Fast on the Ave-rage[C].Proc.of the 6th International Colloquium on Automata Languages,and Programming,1979.118-132.
  • 9Wu S,Manber U.A Fast Algorithm for Multi-pattern Searching[R].Technical Report TR 94-17,University of Arizona,1994.
  • 10Ranum MJ.Thinking about Firewalls v2.0 Veyond Perimeter Security[R].Information Security Technical Report,1997.33-45.

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部