期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于虚实结合的铁路入侵检测监测系统测试技术及平台研究
1
作者 史维峰 张万鹏 +1 位作者 陈中雷 包云 《铁道运输与经济》 北大核心 2024年第7期106-114,131,共10页
随着智能铁路、数字铁路的发展和技防手段在铁路入侵检测监测中的应用,对依托各种智能识别技术建设的入侵检测监测系统的测试成为亟待解决的问题。既有的依托物理实际测试环境的硬件在环测试已无法满足测试需求,需要研发虚实结合的测试... 随着智能铁路、数字铁路的发展和技防手段在铁路入侵检测监测中的应用,对依托各种智能识别技术建设的入侵检测监测系统的测试成为亟待解决的问题。既有的依托物理实际测试环境的硬件在环测试已无法满足测试需求,需要研发虚实结合的测试技术和平台,以满足新一代信息技术赋能下的列车运行环境安全检测监测系统测试需求。为此,对基于虚实结合的铁路入侵检测监测系统的测试场景构建、测试方法、测试关键技术等进行研究,对测试平台的架构、功能进行设计,为铁路入侵检测监测相关系统的测试提供平台和技术支撑,为新技术、新产品、新装备的研发提供试验环境,助力智能检测监测技术、设备和系统的落地应用。 展开更多
关键词 铁路 入侵检测监测 虚实结合 场景驱动 测试平台
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
2
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部