期刊文献+
共找到657篇文章
< 1 2 33 >
每页显示 20 50 100
Container Networking Performance Analysis for Large-Scale User Behavior Simulation 被引量:1
1
作者 Yifang Ji Guomin Zhang +1 位作者 Shengxu Xie Xiulei Wang 《Journal of Computer and Communications》 2019年第10期136-146,共11页
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-... Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process. 展开更多
关键词 Linux CONTAINER networkING Mode network Performance user behavior SIMULATION
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
2
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
3
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL network social network ANALYSIS user behavior ANALYSIS KEYWORD selection
下载PDF
Evaluation of Microblog Users’ Influence Based on PageRank and Users Behavior Analysis 被引量:6
4
作者 Lijuan Huang Yeming Xiong 《Advances in Internet of Things》 2013年第2期34-40,共7页
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and... This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example. 展开更多
关键词 SOCIAL network Microblog userS behavior PAGERANK ALGORITHMS U-R Model INFLUENCE
下载PDF
On-Line Privacy Behavior: Using User Interfaces for Salient Factors
5
作者 Thomas Hughes-Roberts Elahe Kani-Zabihi 《Journal of Computer and Communications》 2014年第4期220-231,共12页
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie... The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required. 展开更多
关键词 ON-LINE PRIVACY Social networkING Site user Interface users’ behavior Theory of PLANNED behavior
下载PDF
Trust evolvement method of Web service combination based on network behavior
6
作者 刘济波 向占宏 朱培栋 《Journal of Central South University of Technology》 EI 2008年第4期558-563,共6页
Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the met... Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination. 展开更多
关键词 network behavior Web service combination trust evolvement Dempster-Shafer rule
下载PDF
A Fast Detection Method of Network Crime Based on User Portrait
7
作者 Yabin Xu Meishu Zhang Xiaowei Xu 《Journal of Information Hiding and Privacy Protection》 2021年第1期17-28,共12页
In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct ... In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method. 展开更多
关键词 user portrait abnormal behavior audit network crime abnormal behavior rule base
下载PDF
A mixed stochastic user equilibrium model considering influence of advanced traveller information systems in degradable transport network 被引量:4
8
作者 程琳 楼小明 +1 位作者 周静 马捷 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第5期1182-1194,共13页
Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network cap... Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm. 展开更多
关键词 mixed stochastic user equilibrium model degradable transport network advanced traveler information systems (ATIS) drivers' behavioral adaptability multiple equilibrium behaviors fixed point problem
下载PDF
Factors influencing knowledge contribution:An empirical investigation of social networking website users
9
作者 Shengli DENG Ting ZHOU Min ZHANG 《Chinese Journal of Library and Information Science》 2012年第4期37-50,共14页
Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which inf... Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities. 展开更多
关键词 Social networking sites(SNS) network user Knowledge contribution user behavior Influencing factor
下载PDF
Introduction to information seeking behavior—A review of literature and field practice directions
10
作者 Li-Ping KU 《Chinese Journal of Library and Information Science》 2010年第1期65-78,共14页
The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map show... The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented. 展开更多
关键词 Social network analysis Library and information science database Information seeking behavior user behavior
下载PDF
行为经济学视角下担保型以物抵债的界定 被引量:2
11
作者 汪洋 刘冲 《云南社会科学》 北大核心 2024年第1期13-23,共11页
《合同编通则司法解释》所采取的“债务履行期届满前/后”之标准无法清楚界定担保型以物抵债。界定担保型以物抵债的意义在于准确适用流担保禁止规则,无法清楚界定的深层次原因在于对流担保禁止规则的正当性基础存在认识偏差。从行为经... 《合同编通则司法解释》所采取的“债务履行期届满前/后”之标准无法清楚界定担保型以物抵债。界定担保型以物抵债的意义在于准确适用流担保禁止规则,无法清楚界定的深层次原因在于对流担保禁止规则的正当性基础存在认识偏差。从行为经济学和心理学的研究来看,流担保禁止规则的正当性基础应当是避免债务人因过度自信和盲目乐观而受损。从这个角度出发,可以对以物抵债协议进行再类型化:若债务人最终给付内容不是由其的履行能力决定,或债务人最终给付内容的不确定不会对其造成损失,则以物抵债协议不需要被限制;在其他情况下,有必要对以物抵债协议的效力予以限制。若当事人存在担保的意思,则应通过流担保禁止规则限制以物抵债协议的效力,否则就适用违约金酌减规则。 展开更多
关键词 《合同编通则司法解释》 行为经济学 担保型以物抵债 流担保禁止规则 违约金酌减规则
下载PDF
面向高性能计算环境的多维自适应授权访问策略
12
作者 和荣 王小宁 +3 位作者 肖海力 卢莎莎 赵一宁 迟学斌 《高技术通讯》 CAS 北大核心 2024年第4期331-341,共11页
高性能计算能力是国家综合实力和创新能力的重要体现,是支撑我国科技持续发展的关键技术之一。随着高性能计算的发展,越来越多领域的科研人员开始关注并使用高性能计算环境。高性能计算环境目前面临资源有限、用户数目增多等挑战。为保... 高性能计算能力是国家综合实力和创新能力的重要体现,是支撑我国科技持续发展的关键技术之一。随着高性能计算的发展,越来越多领域的科研人员开始关注并使用高性能计算环境。高性能计算环境目前面临资源有限、用户数目增多等挑战。为保证环境的安全性、提高环境资源的利用率,需设置一定的授权访问策略来约束用户的访问行为。本文针对高性能计算环境服务对象用户和应用社区或业务平台,基于机器学习算法对用户行为进行分析获取相关属性,设计并实现了一种多维自适应授权访问策略(MAAC)。实验表明,MAAC可实现对环境资源有效和灵活访问控制,同时该策略的决策时间可控制在1 ms内,与策略响应时间相比可忽略不计。 展开更多
关键词 高性能计算环境 授权 属性 用户行为 安全
下载PDF
一种融合表征的农产品推荐算法
13
作者 黄英来 冀宇超 刘镇波 《哈尔滨理工大学学报》 CAS 北大核心 2024年第3期20-27,共8页
针对农产品电商平台,产品季节性强、地域性强、用户行为多变,导致推荐效果不理想的问题,提出了一种融合表征的农产品推荐算法。首先,用长短期记忆网络和注意力网络相结合组成深度兴趣网络,以此来捕获物品的潜在特征;其次,构建用户-商品... 针对农产品电商平台,产品季节性强、地域性强、用户行为多变,导致推荐效果不理想的问题,提出了一种融合表征的农产品推荐算法。首先,用长短期记忆网络和注意力网络相结合组成深度兴趣网络,以此来捕获物品的潜在特征;其次,构建用户-商品二部图;再次,利用图神经网络提取图数据的连接信息对每个节点的影响,并更新节点的嵌入式表示,以获取用户的潜在特征;最后,将两种潜在特征通过多层感知机得到待推荐农产品的购买概率,进一步提取和利用了用户行为序列中的用户深度兴趣,并将其融合深度兴趣网络进行推荐。实验结果表明:融合表征的农产品推荐算法相较于原有模型AUC指标提高9%以上,准确率和召回率提高约6%以上;相较于不考虑节点嵌入式表示的情况,AUC和准确率、召回率也均有提高。 展开更多
关键词 图神经网络 深度兴趣网络 推荐系统 农产品 用户行为 二部图
下载PDF
基于用户画像的暖通空调智能调控
14
作者 胡锐 袁海峰 芮忠 《现代电子技术》 北大核心 2024年第1期134-139,共6页
目前,建筑物中的暖通中央空调系统基本上是根据行业准则设置的,然而,多项研究表明,由于用户的偏好、姿态和需求各异,这种传统做法不太可能满足大多数用户的热量需求。为了更精准地满足用户热量需求,使得基于用户行为模式来针对性提高热... 目前,建筑物中的暖通中央空调系统基本上是根据行业准则设置的,然而,多项研究表明,由于用户的偏好、姿态和需求各异,这种传统做法不太可能满足大多数用户的热量需求。为了更精准地满足用户热量需求,使得基于用户行为模式来针对性提高热舒适性成为可能。文中采用深度强化学习的方法实现智能化暖通空调智能送风策略,该策略能够根据环境和用户行为模式动态地确定最佳暖通空调设置(温度设置和送风设置),从而极大提高用户的热舒适度,同时,实验结果还表明该智能调控策略相比传统固定值控制策略具有一定的节能效果。 展开更多
关键词 深度强化学习 用户行为模式 热舒适度 深度学习 建筑节能 服装热阻值 DQN 神经网络
下载PDF
主体异质性下矿工不安全行为传播机理研究
15
作者 李新春 邱尊相 +2 位作者 刘全龙 张晓霖 张悦倩 《运筹与管理》 CSCD 北大核心 2024年第6期220-226,共7页
群体不安全行为极易导致严重的生产事故,探究个体到群体的不安全行为传播机理对于预防煤矿事故发生尤为重要。为此,本文首先通过Word2Vec方法辨识350起煤矿事故报告中各类生产主体的不安全行为特征;进而结合关联规则和复杂网络理论,构... 群体不安全行为极易导致严重的生产事故,探究个体到群体的不安全行为传播机理对于预防煤矿事故发生尤为重要。为此,本文首先通过Word2Vec方法辨识350起煤矿事故报告中各类生产主体的不安全行为特征;进而结合关联规则和复杂网络理论,构建主体异质性下矿工不安全行为传播网络;最后通过网络中心性分析和事故路径分析明确了8项核心不安全行为及其关联集合、6种事故不安全行为传播关键链路。研究表明:现场监督人员是不安全行为传播过程中最具影响力的主体类型,监督人员安全检查不到位、未及时督促消除隐患是造成群体性不安全行为发生的关键原因。机电事故是不安全行为传播最易触发的事故类型,安全管理工作检查督促不力→安全教育培训不到位→现场安全确认走过场→作业人员安全意识淡薄→现场违章作业是机电事故中不安全行为传播的关键链路。 展开更多
关键词 不安全行为 传播机理 Word2Vec 复杂网络 关联规则
下载PDF
基于CPSS视角的需求响应能力评估综述 被引量:1
16
作者 张凯瑞 明昊 高赐威 《电力科学与技术学报》 CAS CSCD 北大核心 2024年第1期28-46,共19页
对信息—物理—社会系统与需求响应评估的结合进行综述。首先对信息物理系统的历史和框架进行分析。接着总结了现有的需求响应研究现状,包括需求响应潜力评估的意义、分类和评估方法。对于需求响应能力评估的数据来源进行总结,包括问卷... 对信息—物理—社会系统与需求响应评估的结合进行综述。首先对信息物理系统的历史和框架进行分析。接着总结了现有的需求响应研究现状,包括需求响应潜力评估的意义、分类和评估方法。对于需求响应能力评估的数据来源进行总结,包括问卷调查和运行数据采集。在信息—物理—社会系统与需求响应结合方面,分别分析需求响应的物理域、信息域和社会域基础,介绍相应的建模方法和研究内容。最后,对未来的研究展望进行讨论,包括市场考核机制、快速仿真与建模技术以及综合能源下的需求响应管理。 展开更多
关键词 信息—物理—社会系统 需求响应 潜力评估 信息网络 新型电力系统 用户行为
下载PDF
面向加密流量的社交软件用户行为识别
17
作者 吴桦 王磊 +2 位作者 黄瑞琪 程光 胡晓艳 《计算机研究与发展》 EI CSCD 北大核心 2024年第9期2321-2333,共13页
随着智能终端和社交网络越来越融入人们的日常生活,针对社交软件的用户行为识别在网络管理、网络环境监管和市场调研等方面发挥越来越重要的作用.社交软件普遍使用端到端加密协议进行加密数据传输,现有方法通常提取加密数据的统计特征... 随着智能终端和社交网络越来越融入人们的日常生活,针对社交软件的用户行为识别在网络管理、网络环境监管和市场调研等方面发挥越来越重要的作用.社交软件普遍使用端到端加密协议进行加密数据传输,现有方法通常提取加密数据的统计特征进行行为识别.但这些方法识别的性能不稳定且需要的数据量多,这些缺点影响了方法的实用性.提出了一种面向加密流量的社交软件用户行为识别方法.首先,从加密流量中识别出稳定的控制流数据,并提取控制服务数据分组负载长度序列.然后设计了2种神经网络模型,用于自动从控制流负载长度序列中提取特征,细粒度地识别用户行为.最后,以WhatsApp为例进行了实验,2种神经网络模型对WhatsApp用户行为的识别精准率、召回率和F1-score均超过96%.与类似工作的实验比较证明了该方法识别性能的稳定性,此外,该方法能够通过很少的控制流数据分组达到较高的识别精准率,对实时行为识别的研究具有重要的现实意义. 展开更多
关键词 社交网络 用户行为 服务频次 控制流 长度序列
下载PDF
基于决策树的社交网络隐式用户行为数据挖掘方法
18
作者 韩永印 王侠 王志晓 《沈阳工业大学学报》 CAS 北大核心 2024年第3期312-317,共6页
为了解决社交网络隐式用户行为数据挖掘过程中关联相似性计算较为困难的问题,提出了基于决策树的社交网络隐式用户行为数据挖掘方法。将社交网络视为包含不同维度的向量空间,计算特定维度上用户的兴趣空间和兴趣点。确定样本属性集后,... 为了解决社交网络隐式用户行为数据挖掘过程中关联相似性计算较为困难的问题,提出了基于决策树的社交网络隐式用户行为数据挖掘方法。将社交网络视为包含不同维度的向量空间,计算特定维度上用户的兴趣空间和兴趣点。确定样本属性集后,根据已知行为数据建立测试分支,计算该分支下子集的属性权重,不断迭代直至挖掘到同等属性的数据点为止。测试结果表明:该方法可对不同种类隐式用户行为精准挖掘,目标行为数据查找效果较好,实用性较强。 展开更多
关键词 决策树 社交网络 隐式用户行为 向量空间 属性集 数据挖掘 权重值 属性元素
下载PDF
基于软件机器人的工控靶场应用软件行为模拟
19
作者 刘志尧 张格 +3 位作者 刘红日 张旭 陈翊璐 王佰玲 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第7期2237-2244,共8页
工控靶场为开展工业控制系统(ICS)安全研究提供重要支撑。面向工控靶场关键任务之一的应用软件行为模拟,提出一种软件机器人方法以实现工控靶场应用软件行为的逼真模拟。考虑软件图形界面及软件内在显隐式规则,提出基于尺度不变特征变换... 工控靶场为开展工业控制系统(ICS)安全研究提供重要支撑。面向工控靶场关键任务之一的应用软件行为模拟,提出一种软件机器人方法以实现工控靶场应用软件行为的逼真模拟。考虑软件图形界面及软件内在显隐式规则,提出基于尺度不变特征变换(SIFT)图像相似度的软件菜单采集算法及混合状态机模型对应用软件行为进行建模。针对软件机器人的智能化问题,使用深度Q网络(DQN)算法驱动软件机器人对应用软件行为进行自主学习,同时结合多重经验回访和多重目标网络对DQN算法进行优化。实验结果表明:基于DQN的软件机器人能够对工控软件进行有效学习,且优化后的DQN算法自主学习效果更佳。 展开更多
关键词 工控靶场 应用软件行为模拟 软件机器人 混合状态机 深度Q网络
下载PDF
基于黎曼流形的健身APP风险度量方法
20
作者 宋策 赵小林 +2 位作者 谢昆 刘晓然 李彬涵 《首都体育学院学报》 北大核心 2024年第5期497-504,共8页
随着智能设备的普及,其应用系统已成为恶意软件攻击的主要目标,存在巨大的网络安全隐患。健身App因其获取数据的隐私性和敏感性,面临的数据安全问题更加严峻,其安全度量模型成为解决这一挑战的关键点。目前的安全度量模型多数基于静态... 随着智能设备的普及,其应用系统已成为恶意软件攻击的主要目标,存在巨大的网络安全隐患。健身App因其获取数据的隐私性和敏感性,面临的数据安全问题更加严峻,其安全度量模型成为解决这一挑战的关键点。目前的安全度量模型多数基于静态特征构建,未能全面考虑智能设备的动态网络行为。为了弥补这一不足,提出一种基于网络行为的健身App安全度量模型,运用协方差矩阵对网络空间进行转换,提高了对恶意软件攻击识别的准确率,根据健身App的动态网络行为特征,更全面地揭示了其安全状态,同时结合黎曼度量,有效描述了网络安全风险,并计算其值,从而构建出一个基于恶意软件攻击识别与黎曼流形的风险度量模型,以实现更安全的数据保护。 展开更多
关键词 数据安全 网络行为 黎曼流形 风险度量模型 协方差矩阵
下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部