期刊文献+
共找到22,528篇文章
< 1 2 250 >
每页显示 20 50 100
An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm 被引量:1
1
作者 Huaixi Xing Qinghua Xing 《Computers, Materials & Continua》 SCIE EI 2023年第9期2685-2705,共21页
With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive o... With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment(WTA)model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony(MOABC)algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance(IGD)index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space. 展开更多
关键词 Weapon target assignment multi-objective artificial bee colony air defense defensive resource loss total weapon consumption target residual effectiveness
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
2
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming
下载PDF
Evaluation method and optimization strategies of resilience for air&space defense system of systems based on kill network theory and improved self-information quantity 被引量:6
3
作者 Qi Han Bo Pang +4 位作者 Sen Li Ning Li Peng-song Guo Cheng-li Fan Wei-min Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第3期219-239,共21页
Resilience of air&space defense system of systems(SoSs)is critical to national air defense security.However,the research on it is still scarce.In this study,the resilience of air&space defense SoSs is firstly ... Resilience of air&space defense system of systems(SoSs)is critical to national air defense security.However,the research on it is still scarce.In this study,the resilience of air&space defense SoSs is firstly defined and the kill network theory is established by combining super network and kill chain theory.Two cases of the SoSs are considered:(a)The kill chains are relatively homogenous;(b)The kill chains are relatively heterogenous.Meanwhile,two capability assessment methods,which are based on the number of kill chains and improved self-information quantity,respectively,are proposed.The improved self-information quantity modeled based on nodes and edges can achieve qualitative and quantitative assessment of the combat capability by using linguistic Pythagorean fuzzy sets.Then,a resilient evaluation index consisting of risk response,survivability,and quick recovery is proposed accordingly.Finally,network models for regional air defense and anti-missile SoSs are established respectively,and the resilience measurement results are verified and analyzed under different attack and recovery strategies,and the optimization strategies are also proposed.The proposed theory and method can meet different demands to evaluate combat capability and optimize resilience of various types of air&space defense and similar SoSs. 展开更多
关键词 network optimization THEORY
下载PDF
Request pattern change-based cache pollution attack detection and defense in edge computing
4
作者 Junwei Wang Xianglin Wei +3 位作者 Jianhua Fan Qiang Duan Jianwei Liu Yangang Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1212-1220,共9页
Through caching popular contents at the network edge,wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.However,popularity-based cach... Through caching popular contents at the network edge,wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.However,popularity-based caching strategies are vulnerable to Cache Pollution Attacks(CPAs)due to the weak security protection at both edge nodes and mobile devices.In CPAs,through initiating a large number of requests for unpopular contents,malicious users can pollute the edge caching space and degrade the caching efficiency.This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework,and introduces an eavesdroppingbased CPA strategy.Then,an edge caching mechanism,which contains a Request Pattern Change-based Cache Pollution Detection(RPC2PD)algorithm and an Attack-aware Cache Defense(ACD)algorithm,is proposed to defend against CPAs.Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio. 展开更多
关键词 Mobile edge computing Cache pollution attack Flash crowd
下载PDF
Pointing Fingers from A Glass House The fundamental purpose of the increase in China’s defense budget is to safeguard national security and meet the challenges of global changes unseen in a century
5
作者 Wang Keyu 《China Report ASEAN》 2023年第4期32-33,共2页
On March 5,the Ministry of Finance released the 2023 government budget draft report,according to which China’s defense budget of 2023 will be 1.55 trillion yuan(US$224.79 billion),an increase of 7.2 percent year on y... On March 5,the Ministry of Finance released the 2023 government budget draft report,according to which China’s defense budget of 2023 will be 1.55 trillion yuan(US$224.79 billion),an increase of 7.2 percent year on year,which is only 0.1 percentage points higher than 2022.The release of the defense budget attracted the attention of many foreign media outlets,some of which delivered distorted interpretations and exaggerated“China’s threat of force.”On March 6,Tan Kefei,spokesperson for the delegation of the People’s Liberation Army and the People’s Armed Police Force to the First Session of the 14th National People’s Congress,said that China has adhered to the principle of coordinated development of national defense and economic development. 展开更多
关键词 BUDGET delegation outlet
下载PDF
Ripple-effect analysis for operational architecture of air defense systems with supernetwork modeling 被引量:5
6
作者 Zhigang Zou Fuxian Liu +2 位作者 Shiman Sun Lu Xia Chengli Fan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期249-264,共16页
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model... In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints. 展开更多
关键词 operational architecture air defense system super-network model Laplace spectral radius ripple-effect analysis.
下载PDF
Multi-agent decision support system for missile defense based on improved PSO algorithm 被引量:5
7
作者 Zilong Cheng Li Fan Yulin Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第3期514-525,共12页
Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as dev... Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as developing a real one requires lots of manpower and resources. BMDS is a typical complex system for its nonlinear, adaptive and uncertainty characteristics. The agent-based modeling method is well suited for the complex system whose overall behaviors are determined by interactions among individual elements. A multi-agent decision support system (DSS), which includes missile agent, radar agent and command center agent, is established based on the studies of structure and function of BMDS. Considering the constraints brought by radar, intercept missile, offensive missile and commander, the objective function of DSS is established. In order to dynamically generate the optimal interception plan, the variable neighborhood negative selection particle swarm optimization (VNNSPSO) algorithm is proposed to support the decision making of DSS. The proposed algorithm is compared with the standard PSO, constriction factor PSO (CFPSO), inertia weight linear decrease PSO (LDPSO), variable neighborhood PSO (VNPSO) algorithm from the aspects of convergence rate, iteration number, average fitness value and standard deviation. The simulation results verify the efficiency of the proposed algorithm. The multi-agent DSS is developed through the Repast simulation platform and the constructed DSS can generate intercept plans automatically and support three-dimensional dynamic display of missile defense process. 展开更多
关键词 agent-based modeling missile defense system decision support system (DSS) variable neighborhood negative selection particle swarm optimization (PSO)
下载PDF
A novel plant defensin from Chinese mistletoe,Viscum coloratum (Kom.) Nakai 被引量:1
8
作者 Shi Lei Liu Xiu Bao Du Jing Lin Kong Hui Jiang 《Chinese Chemical Letters》 SCIE CAS CSCD 2007年第1期55-58,共4页
A novel polypeptide named as defensin CM was isolated from Chinese mistletoe, Viscum coloratura (Kom.) Nakai. The amino acid sequence was determined by the combination of Edman degradation, endoproteinase Lys-C dige... A novel polypeptide named as defensin CM was isolated from Chinese mistletoe, Viscum coloratura (Kom.) Nakai. The amino acid sequence was determined by the combination of Edman degradation, endoproteinase Lys-C digestion, and MALDI-TOF mass spectrometry. The primary structure was ATCSAPSGRF KGACFSSNTC SNICKTLEGL KDGHCTGLAC YCSRNC. 展开更多
关键词 Viscum coloratura MISTLETOE Primary structure Plant defensin POLYPEPTIDE
下载PDF
Optimal index shooting policy for layered missile defense system 被引量:1
9
作者 LI Longyue FAN Chengli +2 位作者 XING Qinghua XU Hailong ZHAO Huizhen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期118-129,共12页
In order to cope with the increasing threat of the ballistic missile(BM)in a shorter reaction time,the shooting policy of the layered defense system needs to be optimized.The main decisionmaking problem of shooting op... In order to cope with the increasing threat of the ballistic missile(BM)in a shorter reaction time,the shooting policy of the layered defense system needs to be optimized.The main decisionmaking problem of shooting optimization is how to choose the next BM which needs to be shot according to the previous engagements and results,thus maximizing the expected return of BMs killed or minimizing the cost of BMs penetration.Motivated by this,this study aims to determine an optimal shooting policy for a two-layer missile defense(TLMD)system.This paper considers a scenario in which the TLMD system wishes to shoot at a collection of BMs one at a time,and to maximize the return obtained from BMs killed before the system demise.To provide a policy analysis tool,this paper develops a general model for shooting decision-making,the shooting engagements can be described as a discounted reward Markov decision process.The index shooting policy is a strategy that can effectively balance the shooting returns and the risk that the defense mission fails,and the goal is to maximize the return obtained from BMs killed before the system demise.The numerical results show that the index policy is better than a range of competitors,especially the mean returns and the mean killing BM number. 展开更多
关键词 Gittins index shooting policy layered missile defense multi-armed bandits problem Markov decision process
下载PDF
Automated integration of real-time and non-real-time defense systems
10
作者 Emre Dalkıran Tolga Onel +1 位作者 Okan Topçu Kadir Alpaslan Demir 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第2期657-670,共14页
Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems.Smart cities,smart homes,ambient intelligent systems,or network-centric defense systems... Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems.Smart cities,smart homes,ambient intelligent systems,or network-centric defense systems are among these application domains.Data Distribution Service(DDS)is a communication mechanism based on Data-Centric Publish-Subscribe(DCPS)model.It is used for distributed systems with real-time operational constraints.Java Message Service(JMS)is a messaging standard for enterprise systems using Service Oriented Architecture(SOA)for non-real-time operations.JMS allows Java programs to exchange messages in a loosely coupled fashion.JMS also supports sending and receiving messages using a messaging queue and a publish-subscribe interface.In this article,we propose an architecture enabling the automated integration of distributed real-time and non-real-time systems.We test our proposed architecture using a distributed Command,Control,Communications,Computers,and Intelligence(C4I)system.The system has DDS-based real-time Combat Management System components deployed to naval warships,and SOA-based non-real-time Command and Control components used at headquarters.The proposed solution enables the exchange of data between these two systems efficiently.We compare the proposed solution with a similar study.Our solution is superior in terms of automation support,ease of implementation,scalability,and performance. 展开更多
关键词 Systems integration System of systems Systems engineering Software engineering C4I systems Defense systems Data distribution service DDS integration Java message service JMS
下载PDF
Intercepts allocation for layered defense
11
作者 Longyue Li Fuxian Liu +2 位作者 Guangzheng Long Pengsong Guo Yingying Mei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期602-611,共10页
One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles... One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles, we illustrate how defense weapons, ballistic missiles, kill probability and effectiveness of defense(ED) are interrelated and how to understand this relationship for achieving the best allocation plan. Motivated by the queueing theory, in which the available resources are not sufficient to satisfy the demands placed upon them at all times, the layered deployed defense weapon is modeled as a queueing system to shoot Poisson arrived targets. Simultaneously, examples, of optimum intercepts allocation problems under different constraints are presented. The four theorems determine the allocation rules of intercepts to targets that maximize ED or minimize the cost to achieve a required ED. 展开更多
关键词 intercepts allocation layered defense queueing theory effectiveness of defense
下载PDF
Analysis Criteria for Defense Expenditure Performance - Economy, Efficiency, and Effectiveness
12
作者 Ling Yang He Gui 《Proceedings of Business and Economic Studies》 2021年第5期117-123,共7页
Based on the analysis of public expenditure performance,this article discusses the economy,efficiency,and effectiveness of defense expenditure performance,explains the relationship of the three,and emphasizes their un... Based on the analysis of public expenditure performance,this article discusses the economy,efficiency,and effectiveness of defense expenditure performance,explains the relationship of the three,and emphasizes their unity,interaction,and priority.The defense expenditure performance evaluation system,which is a comprehensive assessment of processes and results,is put forward along with the unification of economy,efficiency,and effectiveness.This system can be used to analyze whether the allocation and use of defense funds have achieved the strategic objectives of the Department of Defense. 展开更多
关键词 Defense expenditure performance ECONOMY Efficiency and effectiveness
下载PDF
Threat evaluation method of warships formation air defense based on AR(p)-DITOPSIS 被引量:3
13
作者 SUN Haiwen XIE Xiaofang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第2期297-307,共11页
For the target threat evaluation of warships formation air defense, the sample data are frequently insufficient and even incomplete. The existing evaluation methods rely too much on expertise and are difficult to carr... For the target threat evaluation of warships formation air defense, the sample data are frequently insufficient and even incomplete. The existing evaluation methods rely too much on expertise and are difficult to carry out for the dynamic evaluation on time series. In order to solve these problems, a threat evaluation method based on the AR(p)(auto regressive(AR))-dynamic improved technique for order preference by similarity to ideal solution(DITOPSIS) method is proposed. The AR(p) model is adopted to predict the missing data on the time series. Then, the entropy weight method is applied to solve each index weight at the objective point. Kullback-Leibler divergence(KLD) is used to improve the traditional TOPSIS, and to carry out the target threat evaluation. The Poisson distribution is used to assign the weight value.Simulation results show that the improved AR(p)-DITOPSIS threat evaluation method can synthetically take into account the target threat degree in time series and is more suitable for the threat evaluation under the condition of missing the target data than the traditional TOPSIS method. 展开更多
关键词 AR(p) model Kullback-Leibler DIVERGENCE (KLD) dynamic improved technique for order PREFERENCE by similarity to ideal solution (DITOPSIS) time series THREAT evaluation
下载PDF
CRSG:A congestion control routing algorithm for security defense based on social psychology and game theory in DTN 被引量:1
14
作者 王珵珺 龚正虎 +2 位作者 陶勇 张子文 赵宝康 《Journal of Central South University》 SCIE EI CAS 2013年第2期440-450,共11页
The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and coopera... The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN. 展开更多
关键词 delay/disruption tolerant networks social psychology game theory congestion control ROUTING
下载PDF
Defense Against Poisoning Attack via Evaluating TrainingSamples Using Multiple Spectral Clustering Aggregation Method 被引量:2
15
作者 Wentao Zhao Pan Li +2 位作者 Chengzhang Zhu Dan Liu Xiao Liu 《Computers, Materials & Continua》 SCIE EI 2019年第6期817-832,共16页
The defense techniques for machine learning are critical yet challenging due tothe number and type of attacks for widely applied machine learning algorithms aresignificantly increasing. Among these attacks, the poison... The defense techniques for machine learning are critical yet challenging due tothe number and type of attacks for widely applied machine learning algorithms aresignificantly increasing. Among these attacks, the poisoning attack, which disturbsmachine learning algorithms by injecting poisoning samples, is an attack with the greatestthreat. In this paper, we focus on analyzing the characteristics of positioning samples andpropose a novel sample evaluation method to defend against the poisoning attack cateringfor the characteristics of poisoning samples. To capture the intrinsic data characteristicsfrom heterogeneous aspects, we first evaluate training data by multiple criteria, each ofwhich is reformulated from a spectral clustering. Then, we integrate the multipleevaluation scores generated by the multiple criteria through the proposed multiplespectral clustering aggregation (MSCA) method. Finally, we use the unified score as theindicator of poisoning attack samples. Experimental results on intrusion detection datasets show that MSCA significantly outperforms the K-means outlier detection in terms ofdata legality evaluation and poisoning attack detection. 展开更多
关键词 Poisoning attack sample evaluation spectral clustering ensemble learning.
下载PDF
From Bilateralism to Multilateralism:Evoluuon and Prospects of ASEAN Defense Cooperation
16
作者 He Tao 《China International Studies》 2014年第6期91-108,共18页
In 2010, the inaugural ASEAN Defense Ministers Meeting Plus (ADMM-Plus) attracted the world's attention, bringing awareness to ASEAN's new role as a regional entity with increasing defense characteristics. The mee... In 2010, the inaugural ASEAN Defense Ministers Meeting Plus (ADMM-Plus) attracted the world's attention, bringing awareness to ASEAN's new role as a regional entity with increasing defense characteristics. The meeting marked a milestone in ASEAN's multilateral efforts to enhance defense cooperation. 展开更多
关键词 东盟 合作 防务 主义 双边 区域性 国防
下载PDF
Description of trauma among French service members in the Department of Defense Trauma Registry: Understanding the nature of trauma and the care provided
17
作者 Marc A.Schweizer Jud C.Janak +1 位作者 Zsolt T.Stockinger Tristan Monchal 《Military Medical Research》 SCIE CAS CSCD 2019年第4期275-283,共9页
Background:Since 2001,the French Armed Forces have sustained many casualties during the Global War on Terror;however,even today,there is no French Military trauma registry.Some French service members(SMs)were treated ... Background:Since 2001,the French Armed Forces have sustained many casualties during the Global War on Terror;however,even today,there is no French Military trauma registry.Some French service members(SMs)were treated in US Military Medical Treatment Facilities(MTFs)and were recorded in the US Department of Defense Trauma Registry(Do DTR).Our objective was to conduct a descriptive analysis of the injuries sustained by French SMs reported in the Do DTR and subsequent care provided to them to assist in understanding the importance of building a French Military trauma registry.Methods:Using Do DTR data collected from 2001 to 2017,a retrospective descriptive analysis was conducted.We identified 59 French SMs treated in US MTFs.The characteristics of the SMs’demographics,injuries,care provided to them,and discharge outcomes were summarized.Results:Among the 59 French SMs identified,46(78%)sustained battle injuries(BIs)and 13(22%)sustained nonbattle injuries(NBIs).There were 47(80%)SMs injured in Afghanistan(Opération Pamir),while 12(20%)were injured in Opération Chammal in Iraq and Syria.Explosives accounted for 52.5%of injuries,while 25.4%were due to gunshot wounds;all were BIs.The majority of reported injuries were penetrating(59.3%),most of which were BIs(71.7%).The mean Injury Severity Score for BIs was 12(SD=8.9)compared to 6(SD=1.7)for NBIs.Around half of SMs(n=30;51%)were injured in Afghanistan between the years 2008–2010.Among a total of 246 injuries sustained by 59 patients,extremities were the body part most prone to BIs followed by the head and face.Four SMs died after admission(6.8%).Conclusions:The Do DTR provides extensive data on trauma injuries that can be used to inform injury prevention and clinical care.The majority of injuries sustained by French SMs were BIs,caused by explosives,and predominantly occurring to the extremities;these findings are similar to those of other studies conducted in combat zones.There is a need to establish a French Military trauma registry to improve the combat casualty care provided to French SMs,and its creation may benefit from the Do DTR model. 展开更多
关键词 FRENCH SERVICE MEMBERS US MILITARY treatment facility TRAUMA REGISTRY
下载PDF
Optimization of Air Defense System Deployment Against Reconnaissance Drone Swarms 被引量:1
18
作者 Ning Li Zhenglian Su +2 位作者 Haifeng Ling Mumtaz Karatas Yujun Zheng 《Complex System Modeling and Simulation》 2023年第2期102-117,共16页
Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern ba... Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern battlefields.This paper studies an optimization problem for deploying air defense systems against reconnaissance drone swarms.Given a set of available air defense systems,the problem determines the location of each air defense system in a predetermined region,such that the cost for enemy drones to pass through the region would be maximized.The cost is calculated based on a counterpart drone path planning problem.To solve this adversarial problem,we first propose an exact iterative search algorithm for small-size problem instances,and then propose an evolutionary framework that uses a specific encoding-decoding scheme for large-size problem instances.We implement the evolutionary framework with six popular evolutionary algorithms.Computational experiments on a set of different test instances validate the effectiveness of our approach for defending against reconnaissance drone swarms. 展开更多
关键词 drone swarms anti-drone air defense systems deployment optimization evolutionary algorithms
原文传递
Game theoretic analysis for the mechanism of moving target defense 被引量:5
19
作者 Gui-lin CAI Bao-sheng WANG Qian-qian XING 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期2017-2034,共18页
Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of... Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of the MTD technology is still absent. In this paper, we analyze the defense mechanism of MTD technology in two dimensions. First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technology intuitively. Second, we use the incomplete information dynamic game theory to verify the proactivity and effect of MTD technology. Specifically, we model the interaction between a defender who equips a server with different types of MTD techniques and a visitor who can be a user or an attacker, and analyze the equilibria and their conditions for these models. Then, we take an existing incomplete information dynamic game model for traditional defense and its equilibrium result as baseline for comparison, to validate the proactivity and effect of MTD technology. We also identify the factors that will influence the proactivity and effectiveness of the MTD approaches. This work gives theoretical support for understanding the defense process and defense mechanism of MTD technology and provides suggestions to improve the effectiveness of MTD approaches. 展开更多
关键词 Network security Moving target defense (MTD) Defense mechanism Defense model Game theory
原文传递
网络协议软件漏洞挖掘技术综述 被引量:4
20
作者 喻波 苏金树 +7 位作者 杨强 黄见欣 盛周石 刘润昊 卢建君 梁晨 陈晨 赵磊 《软件学报》 EI CSCD 北大核心 2024年第2期872-898,共27页
网络协议软件部署和应用非常广泛,在网络空间提供了诸如通信、传输、控制、管理等多样化的功能.近年来,其安全性逐渐受到学术界和工业界的重视,及时发现和修补网络协议软件漏洞,成为一项重要的课题.网络协议软件由于部署形态多样、协议... 网络协议软件部署和应用非常广泛,在网络空间提供了诸如通信、传输、控制、管理等多样化的功能.近年来,其安全性逐渐受到学术界和工业界的重视,及时发现和修补网络协议软件漏洞,成为一项重要的课题.网络协议软件由于部署形态多样、协议交互过程复杂、相同协议规范的多个协议实现存在功能差异等特点,使得其漏洞挖掘技术面临诸多挑战.首先对网络协议软件漏洞挖掘技术进行分类,对已有关键技术的内涵进行界定.其次,进一步综述网络协议软件漏洞挖掘4个方面的技术进展,包括网络协议描述方法、挖掘对象适配技术、模糊测试技术和基于程序分析的漏洞挖掘方法,通过对比分析归纳不同方法的技术优势及评价维度.最后,总结网络协议软件漏洞挖掘的技术现状和挑战,并提炼5个潜在研究方向. 展开更多
关键词 网络协议软件 漏洞挖掘 模糊测试 程序分析 符号执行
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部