首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26篇
  免费   6篇
  2021年   1篇
  2019年   1篇
  2018年   1篇
  2016年   1篇
  2015年   2篇
  2014年   2篇
  2013年   8篇
  2012年   1篇
  2011年   3篇
  2010年   2篇
  2009年   1篇
  2007年   1篇
  2002年   1篇
  2001年   1篇
  1997年   2篇
  1996年   2篇
  1994年   1篇
  1985年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
21.
22.
警报关联图:一种网络脆弱性量化评估的新方法   总被引:3,自引:2,他引:1       下载免费PDF全文
作为一种基于模型的脆弱性分析技术,攻击图能够识别网络中存在的脆弱性和它们之间的相互关系,分析出可能的攻击路径和潜在威胁.论文在攻击图的基础上提出了警报关联图的概念,利用攻击图中蕴含的脆弱性先验知识,将实时IDS警报信息映射到攻击路径,动态反映攻击进程和攻击者意图.在此基础上提出了一种基于警报关联图的网络脆弱性量化评估方法,通过计算警报关联边的权值对网络脆弱性进行动态分析,这种方法结合了静态的网络脆弱性先验知识和动态变化的攻击者意图,能有效反映网络脆弱性在动态攻击情况下的变化.  相似文献   
23.
24.
Understanding contemporary conflicts in Africa remains directly dependent on the approaches employed to decipher or interpret them. This article first examines the bias of conventional approaches (inherited from the Cold War) and then those of a series of supposedly “newer” approaches. Relying primarily on West African examples, it offers a brief overview of current knowledge, issues, and avenues for research, based on three apparent characteristics of a “new generation” of conflicts: the regionalization of wars, the privatization of violence and security, and the recourse to extreme forms of brutality. These three major trends bear witness to a rapid transformation of war and armed violence over the past 20 years, but they are not sufficient to establish a radical historical break between “old” and “new” conflicts in Africa. By concealing elements of continuity a priori, the most influential “new” approaches actually make it impossible to ponder their own limits. To that end, fashionability and struggles for influence within the Africanist field play a major role in perpetuating dominant, sensationalistic, or simplistic (and invariably incorrect) portrayals of African conflicts.  相似文献   
25.
分析了目前常用的杂波建模方法,阐述了最大熵分布的重要作用,提出了一种杂波幅度的统计建模方法,通过提取实测杂波数据的中心矩来对杂波幅度的随机特性进行描述,并通过模拟退火算法对杂波数据进行仿真。最后利用McMaster大学IPIX雷达的一组实测海杂波数据对算法进行了验证,结果表明,仿真数据与实测数据的最大熵分布具有很高的拟合程度。  相似文献   
26.
结合防火工作实际,对现行防火规范及《住宅建筑规范》中的安全疏散问题进行了分析,指出了防火规范中存在的关于安全疏散方面的问题,并进行了深入剖析提出了修订建议。  相似文献   
27.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other.  相似文献   
28.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly.  相似文献   
29.
主战坦克在论证研制阶段开展战场运用的战法研究,对于其定型和列装意义重大.提出一种基于CGF的战法仿真方法,并建立相应的战法仿真模型.最后,利用所研制的仿真系统,结合新型主战坦克的一种新战法进行了实例研究,并针对结果进行分析.该思路及仿真系统为新型主战坦克战法研究提供了简便高效的手段,可以满足面向先期概念演示验证中战法研究的需要.  相似文献   
30.
拦截弹推进及弹道参数的模糊优化研究   总被引:2,自引:0,他引:2  
在拦截弹推进系统和弹道参数的设计中 ,引入多目标多约束的模糊优化方法 ,在约束条件一定的情况下 ,合理选择和分配几个重要的设计变量 ,使得拦截弹的总质量最小、拦截时间最短。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号