期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于vprs的电力信息系统网络攻击策略评价方法凝紫
1
作者 刚毅凝 吕旭明 +1 位作者 陈硕 金成明 《中国新通信》 2018年第24期64-64,共1页
本文在研究中以电力信息系统网络攻击策略评价为核心,基于VPRS视角,分析粗糙集理论电力信息网络攻击策略评价方法,提出优化途径,保证评价效果和评价效率,并为相关研究人员提供一定的借鉴和帮助。
关键词 VPRS 电力信息系统 网络攻击策略 评价方法
下载PDF
网络攻击与防御
2
作者 马蓉晖 冯素琴 《山西电子技术》 2010年第6期84-86,共3页
随着Internet的发展与普及,网络安全问题日益突出,已经严重地干扰了网络的自由和安全。就此对目前网络中存在的安全问题进行了探讨与论证,并对目前网络中比较流行的网络攻击手段进行了总结归类和研究与分析,进而提出防御策略。
关键词 网络攻击 网络安全技术 网络攻击应对策略
下载PDF
计算机网络安全及防范策略探究 被引量:3
3
作者 谢平 《中小企业管理与科技》 2010年第30期267-267,共1页
主要阐述了计算机信息网络攻击的特点,并提出了安全防范策略。
关键词 计算机网络安全 网络攻击防范策略
下载PDF
计算机网络安全及防范策略探究 被引量:4
4
作者 刘恂 《现代商贸工业》 2010年第1期275-276,共2页
主要阐述了计算机信息网络攻击的特点,并提出了安全防范策略。
关键词 计算机网络安全网络攻击防范策略
下载PDF
复杂网络抗毁性测度研究综述 被引量:8
5
作者 张琨 谈革新 +1 位作者 庄克琛 赵荣生 《计算机时代》 2010年第5期4-7,共4页
随着对复杂网络的定性特征与定量规律的深入探索,复杂网络的抗毁性测度研究已成为复杂性科学的研究热点之一。文章从抗毁性需求出发,给出了网络抗毁性的定义和抗毁性量化指标,并基于网络攻击策略详述了目前复杂网络抗毁性测度方法的研... 随着对复杂网络的定性特征与定量规律的深入探索,复杂网络的抗毁性测度研究已成为复杂性科学的研究热点之一。文章从抗毁性需求出发,给出了网络抗毁性的定义和抗毁性量化指标,并基于网络攻击策略详述了目前复杂网络抗毁性测度方法的研究进展。最后对复杂网络抗毁性测度研究存在的问题进行了总结,对未来的发展趋势作了展望。 展开更多
关键词 复杂网络 量化指标 抗毁性测度 网络攻击策略
下载PDF
PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION
6
作者 ZhaoShengmei LiFei ZhengBaoyu 《Journal of Electronics(China)》 2005年第1期85-89,共5页
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys... A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy. 展开更多
关键词 Attack strategy Quantum Key Distribution(QKD) Probabilistic cloning machine No-cloning theorem
下载PDF
Discussion on the ARP Protocol and Network Security Policy
7
《International English Education Research》 2014年第1期35-38,共4页
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two c... Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the AR P Find virus source and virus removal methods, and finally putting forward effective measures to guard against AR P virus. 展开更多
关键词 Address resolution ARP spoofing attacks Cache table IP / MAC binding
下载PDF
A fine-grained perspective on the robustness of global cargo ship transportation networks 被引量:13
8
作者 彭澎 程诗奋 +4 位作者 陈金海 廖梦迪 吴琳 刘希亮 陆锋 《Journal of Geographical Sciences》 SCIE CSCD 2018年第7期881-899,共19页
The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while... The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transportation network based on the most recent Automatic Identification System(AIS) data available. First, we subdivide three typical cargo ship transportation networks(i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, including random attack and three intentional attacks(i.e., degree-based attack, betweenness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) compared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation; 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the container network but a minor impact on the bulk carrier and oil tanker transportation networks. These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.Abstract: The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transporta- tion network based on the most recent Automatic Identification System (AIS) data available. First, we subdivide three typical cargo ship transportation networks (i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, in- cluding random attack and three intentional attacks (i.e., degree-based attack, between- ness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) com- pared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the con- tainer network but a minor impact on the bulk carrier and oil tanker transportation networks.These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system. 展开更多
关键词 complex network FINE-GRAINED cargo ship transportation network ROBUSTNESS automatic identification system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部