期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
浅谈烟箱缺条产生的原因及对策研究 被引量:2
1
作者 熊胤 《科技创新与应用》 2013年第3期104-104,共1页
针对近年来我公司收到的烟箱缺条反馈次数的不断上升,对当前使用的装箱设备的使用情况进行了调查,详细分析了产生烟箱缺条的原因,通过设备日常点检、软、硬件改进等措施,有效地减少了烟箱缺条的情况,在保证公司及品牌在消费者心目中的... 针对近年来我公司收到的烟箱缺条反馈次数的不断上升,对当前使用的装箱设备的使用情况进行了调查,详细分析了产生烟箱缺条的原因,通过设备日常点检、软、硬件改进等措施,有效地减少了烟箱缺条的情况,在保证公司及品牌在消费者心目中的地位的同时,也保障了消费者的权益。 展开更多
关键词 烟箱缺条 传感器点检 程序自检 横烟
下载PDF
Behavior analysis of malicious sensor nodes based on optimal response dynamics
2
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部