期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Limiting process of absorbing Markov chains
1
作者 Jinwen CHEN 《Frontiers of Mathematics in China》 SCIE CSCD 2014年第4期753-759,共7页
We outline an approach to investigate the limiting law of an absorbing Markov chain conditional on having not been absorbed for long time. The main idea is to employ Donsker-Varadhan's entropy functional which is typ... We outline an approach to investigate the limiting law of an absorbing Markov chain conditional on having not been absorbed for long time. The main idea is to employ Donsker-Varadhan's entropy functional which is typically used as the large deviation rate function for Markov processes. This approach provides an interpretation for a certain quasi-ergodicity 展开更多
关键词 absorbing markov chain large deviation principal eigenvalue quasi-stationary distribution decay parameter
原文传递
Application Research on Two-Layer Threat Prediction Model Based on Event Graph
2
作者 Shuqin Zhang Xinyu Su +2 位作者 Yunfei Han Tianhui Du Peiyu Shi 《Computers, Materials & Continua》 SCIE EI 2023年第12期3993-4023,共31页
Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.The... Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense. 展开更多
关键词 Knowledge graph multi-source data fusion network security threat modeling event graph absorbing markov chain threat propagation path
下载PDF
ON THE SPH-DISTRIBUTION CLASS 被引量:4
3
作者 史定华 郭进利 刘黎明 《Acta Mathematica Scientia》 SCIE CSCD 2005年第2期201-214,共14页
Following up Neuts' idea, the SPH-distribution class associated with bounded Q matrices for infinite Markov chains is denned. The main result in this paper is to characterize the SPH class through the derivatives ... Following up Neuts' idea, the SPH-distribution class associated with bounded Q matrices for infinite Markov chains is denned. The main result in this paper is to characterize the SPH class through the derivatives of the distribution functions. Based on the characterization theorem, closure properties, the expansion, uniform approximation, and the matrix representations of the SPH class are also discussed by the derivatives of the distribution functions at origin. 展开更多
关键词 Phase type distribution absorbing markov chain operator theory SPHdistribution PROPERTIES
下载PDF
Non-saturated throughput analysis of IEEE 802.11-based cognitive radio networks 被引量:1
4
作者 ZHAO Yuan JIN Shun-fu TIAN Nai-shuo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第6期6-13,共8页
Technology of cognitive radio networks has emerged as an effective method to enhance the utilization of the radio spectrum where the primary users have priority to use the spectrum, and the secondary users try to expl... Technology of cognitive radio networks has emerged as an effective method to enhance the utilization of the radio spectrum where the primary users have priority to use the spectrum, and the secondary users try to exploit the spectrum unoccupied by the primary users. In this paper, considering the non-saturated condition, the performance analysis for the IEEE 802.11-based cognitive radio networks is presented with single-channel and multi-channel, respectively. For the single-channel case, an absorbing Markov chain model describing the system transitions is constructed, and one-step transition probability matrix of the Markov chain is given. By using the method of probability generating function, the non-saturated throughput of the secondary users is obtained. For the multi-channel case, taking into account the negotiation-based sensing policy, the mean number of unused channels perceived by the second users is given, and then the non-saturated aggregate throughput of the secondary users is derived. Finally, numerical examples are provided to show the influences of the non-saturated degree, the number of the secondary users and the channel utilization of the primary users on the performance measures for the non-saturated throughput with single-channel and the non-saturated aggregate throughput with multi-channel. 展开更多
关键词 cognitive radio networks IEEE 802.11 non-saturated throughput absorbing markov chain probability generating function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部