The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Ne...The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Network Security Quantitative Evaluation System,which,from an intruder's angle ,established a Hierarchy Intrusion Relationship Graph by analyzing the credit degree fusion and relevancy of the secure information of the target network and by combining with powerful database information. At last, by applying some relative mathematics model and arithmetic, the paper analyzes and evaluates the security of this Network Hierarchy Intrusion Relationship Graph comprehensively and quantitatively.展开更多
通信软件工程包括系统建模和设计实现两大阶段 ,分别采用非形式化技术与形式化技术 .定义了从非形式化的面向对象的图形语言 U ML ,到形式化的文本规范语言 ESTEL L E的完备的转换规则 ,并简要介绍了一个支持转换的软件工具的设计与实...通信软件工程包括系统建模和设计实现两大阶段 ,分别采用非形式化技术与形式化技术 .定义了从非形式化的面向对象的图形语言 U ML ,到形式化的文本规范语言 ESTEL L E的完备的转换规则 ,并简要介绍了一个支持转换的软件工具的设计与实现 ,最后给出一个转换实例 .此工作的完成 ,使通信系统图形化的面向对象模型可直接转换为面向实现的形式化规范 ,在整个开发周期中得到应用 ,建立起了一套完整的通信软件工程体系 .展开更多
文摘The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Network Security Quantitative Evaluation System,which,from an intruder's angle ,established a Hierarchy Intrusion Relationship Graph by analyzing the credit degree fusion and relevancy of the secure information of the target network and by combining with powerful database information. At last, by applying some relative mathematics model and arithmetic, the paper analyzes and evaluates the security of this Network Hierarchy Intrusion Relationship Graph comprehensively and quantitatively.