期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A framework of force of information influence and application for C4KISR system
1
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
2
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
A reference model for database security proxy 被引量:1
3
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
WARFARE COMMAND STRATAGEM ANALYSIS FOR WINNING BASED ON LANCHESTER ATTRITION MODELS 被引量:8
4
作者 Xiangyong CHEN Yuanwei JING +1 位作者 Chunji LI Mingwei LI 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2012年第1期94-105,共12页
Lanchester equations and their extensions are widely used to calculate attrition in warfare models. The current paper addresses the warfare command decision-making problem for winning when the total combats capability... Lanchester equations and their extensions are widely used to calculate attrition in warfare models. The current paper addresses the warfare command decision-making problem for winning when the total combats capability of the attacking side is not superior to that of the defending side. For this problem, the corresponding warfare command stratagems, which can transform the battlefield situation, are proposed and analyzed quantitatively by considering the influence of the warfare information factor. The application examples in military conflicts show the feasibility and effectiveness of the proposed model and the warfare command stratagems for winning. The research results may provide a theoretical reference for warfare command decision making. 展开更多
关键词 Lanchester attrition models warfare command stratagems battle situation warfare information system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部