提出并解决一种饱和脉冲多智能体系统在拒绝服务(Denial of service,DOS)攻击环境中的安全定制化一致性控制问题.首先引入微分机制和加权策略,构建一种带可调参数一致性模式项的系统模型,以满足复杂场景对一致性的定制化需求.其次结合...提出并解决一种饱和脉冲多智能体系统在拒绝服务(Denial of service,DOS)攻击环境中的安全定制化一致性控制问题.首先引入微分机制和加权策略,构建一种带可调参数一致性模式项的系统模型,以满足复杂场景对一致性的定制化需求.其次结合饱和效应和脉冲机制,为系统设计一种满足执行器功率受限约束的饱和脉冲控制协议.再次采用切换拓扑分析DOS攻击下系统的网络拓扑结构,并采用李雅普洛夫稳定性和矩阵测度理论,得到系统实现安全定制化一致性的充分条件.最后通过仿真实验和对比分析,验证了所提理论的有效性和优越性.展开更多
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers...Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.展开更多
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
针对状态不完全可测的多智能体系统,研究持续异步拒绝服务(Denial of Service,DoS)攻击下基于观测器的安全一致性控制问题.基于切换理论,将受到攻击的多智能体系统建模为满足持续驻留时间的切换系统.攻击睡眠阶段被认为是τ部分,其中通...针对状态不完全可测的多智能体系统,研究持续异步拒绝服务(Denial of Service,DoS)攻击下基于观测器的安全一致性控制问题.基于切换理论,将受到攻击的多智能体系统建模为满足持续驻留时间的切换系统.攻击睡眠阶段被认为是τ部分,其中通信网络中的领导者是全局可达的.攻击激活阶段看作T部分,持续有效的拒绝服务攻击能够破坏原始通讯网络的连通性.通过构造模型依赖Lyapunov函数并求解线性矩阵不等式,获得控制器和观测器增益以实现一致性跟踪.最后,仿真结果验证了所提方法的有效性.展开更多
文摘提出并解决一种饱和脉冲多智能体系统在拒绝服务(Denial of service,DOS)攻击环境中的安全定制化一致性控制问题.首先引入微分机制和加权策略,构建一种带可调参数一致性模式项的系统模型,以满足复杂场景对一致性的定制化需求.其次结合饱和效应和脉冲机制,为系统设计一种满足执行器功率受限约束的饱和脉冲控制协议.再次采用切换拓扑分析DOS攻击下系统的网络拓扑结构,并采用李雅普洛夫稳定性和矩阵测度理论,得到系统实现安全定制化一致性的充分条件.最后通过仿真实验和对比分析,验证了所提理论的有效性和优越性.
基金Supported by the High Technology Research and Development Programme of China (No. 2007AA01Z473)
文摘Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
文摘针对状态不完全可测的多智能体系统,研究持续异步拒绝服务(Denial of Service,DoS)攻击下基于观测器的安全一致性控制问题.基于切换理论,将受到攻击的多智能体系统建模为满足持续驻留时间的切换系统.攻击睡眠阶段被认为是τ部分,其中通信网络中的领导者是全局可达的.攻击激活阶段看作T部分,持续有效的拒绝服务攻击能够破坏原始通讯网络的连通性.通过构造模型依赖Lyapunov函数并求解线性矩阵不等式,获得控制器和观测器增益以实现一致性跟踪.最后,仿真结果验证了所提方法的有效性.