期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于复杂网络的银行同业拆借市场稳定性研究 被引量:30
1
作者 李守伟 何建敏 +1 位作者 庄亚明 施亚明 《管理工程学报》 CSSCI 北大核心 2011年第2期195-199,共5页
基于复杂网络的视角,本文分析了我国银行间同业拆借市场的稳定性。首先基于银行同业拆借关系,采用阈值法构建了银行有向网络模型。在此基础上研究了随机性攻击和选择性攻击对银行网络最大弱成分的影响,进而分析了银行网络的稳定性,并构... 基于复杂网络的视角,本文分析了我国银行间同业拆借市场的稳定性。首先基于银行同业拆借关系,采用阈值法构建了银行有向网络模型。在此基础上研究了随机性攻击和选择性攻击对银行网络最大弱成分的影响,进而分析了银行网络的稳定性,并构建相应的指标对比分析了随机性攻击和选择性攻击对银行网络稳定性影响的差异。研究结果表明:银行网络对于随机性攻击具有较高的稳定性,对于选择性攻击具有较低的稳定性,并且两种攻击方式对银行网络影响的差异大小与阈值有关。 展开更多
关键词 银行同业拆借市场 稳定性 随机性攻击 选择性攻击
下载PDF
中国进口原油海运网络连通可靠性 被引量:2
2
作者 吕靖 王爽 《中国航海》 CSCD 北大核心 2017年第3期118-124,共7页
为科学衡量中国进口原油海运网络中节点功能失效对网络连通可靠性的影响,在识别网络中重要节点的基础上,针对节点面临的随机性攻击和选择性攻击,分别采用蒙特卡洛模拟和不交化最小路集算法建立中国进口原油海运网络的连通可靠性评估模... 为科学衡量中国进口原油海运网络中节点功能失效对网络连通可靠性的影响,在识别网络中重要节点的基础上,针对节点面临的随机性攻击和选择性攻击,分别采用蒙特卡洛模拟和不交化最小路集算法建立中国进口原油海运网络的连通可靠性评估模型。评价结果表明:当节点面临随机性攻击时,中国进口原油海运网络相对可靠;而在面对选择性攻击时,网络连通可靠性大幅下降,原油进口安全受到较大威胁。此外,在中国进口原油海运网络的3个原油海运通道中,拉美通道的连通可靠性相对最好,中东通道的连通可靠性相对最差。 展开更多
关键词 原油海运网络 连通可靠性 节点失效 随机性攻击 选择性攻击
下载PDF
地铁网络鲁棒性评价指标 被引量:2
3
作者 赖丽萍 《长春工业大学学报》 CAS 2018年第6期568-572,共5页
以复杂拓扑网络作为理论基础,构建适用于地铁线网的鲁棒性评价指标体系。以2015年北京地铁线网为实例,进行选择性和随机性攻击的两种模拟;分别统计两种供给模式指标值,并分析比较各指标值变化的趋势和原因。
关键词 复杂网络 鲁棒性 随机性攻击 选择性攻击
下载PDF
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
4
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,whi... Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption,compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality(LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing(VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks. 展开更多
关键词 Networked control systems Security Cyber attacks Stochastic stability Cryptographic protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部