期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
APPLICATION OF HIERARCHY ARTIFICIAL NEURAL NETWORK TO EVALUATE THE EXPLOITATIONCONDITIONS OF SURFACE MINING AREA
1
作者 李新春 范力军 《Journal of Coal Science & Engineering(China)》 1998年第2期23-28,共6页
It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under the aid of experts and it is affected ... It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under the aid of experts and it is affected by the subjective thinking of the experts. This paper puts forwards a new approach that divides the whole exploitation conditions into sixteen subsidiary systems and each subsidiary system forms a neural network system. The whole decision system of exploitation conditions of surface mining areas is composed of sixteen subsidiary neural network systems. Each neural network is practiced with the data of the worksite, which is reasonable and scientific. This way will be a new decision approach for exploiting the surface mining areas. 展开更多
关键词 HIERARCHY artificial neural network exploitation conditions of surface mining areas resource evaluation
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
2
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部