排序方式: 共有32条查询结果,搜索用时 15 毫秒
21.
22.
作为一种基于模型的脆弱性分析技术,攻击图能够识别网络中存在的脆弱性和它们之间的相互关系,分析出可能的攻击路径和潜在威胁.论文在攻击图的基础上提出了警报关联图的概念,利用攻击图中蕴含的脆弱性先验知识,将实时IDS警报信息映射到攻击路径,动态反映攻击进程和攻击者意图.在此基础上提出了一种基于警报关联图的网络脆弱性量化评估方法,通过计算警报关联边的权值对网络脆弱性进行动态分析,这种方法结合了静态的网络脆弱性先验知识和动态变化的攻击者意图,能有效反映网络脆弱性在动态攻击情况下的变化. 相似文献
23.
24.
Michel Ben Arrous 《Defense & Security Analysis》2014,30(1):55-66
Understanding contemporary conflicts in Africa remains directly dependent on the approaches employed to decipher or interpret them. This article first examines the bias of conventional approaches (inherited from the Cold War) and then those of a series of supposedly “newer” approaches. Relying primarily on West African examples, it offers a brief overview of current knowledge, issues, and avenues for research, based on three apparent characteristics of a “new generation” of conflicts: the regionalization of wars, the privatization of violence and security, and the recourse to extreme forms of brutality. These three major trends bear witness to a rapid transformation of war and armed violence over the past 20 years, but they are not sufficient to establish a radical historical break between “old” and “new” conflicts in Africa. By concealing elements of continuity a priori, the most influential “new” approaches actually make it impossible to ponder their own limits. To that end, fashionability and struggles for influence within the Africanist field play a major role in perpetuating dominant, sensationalistic, or simplistic (and invariably incorrect) portrayals of African conflicts. 相似文献
25.
分析了目前常用的杂波建模方法,阐述了最大熵分布的重要作用,提出了一种杂波幅度的统计建模方法,通过提取实测杂波数据的中心矩来对杂波幅度的随机特性进行描述,并通过模拟退火算法对杂波数据进行仿真。最后利用McMaster大学IPIX雷达的一组实测海杂波数据对算法进行了验证,结果表明,仿真数据与实测数据的最大熵分布具有很高的拟合程度。 相似文献
26.
王奔 《中国人民武装警察部队学院学报》2011,(10):35-37
结合防火工作实际,对现行防火规范及《住宅建筑规范》中的安全疏散问题进行了分析,指出了防火规范中存在的关于安全疏散方面的问题,并进行了深入剖析提出了修订建议。 相似文献
27.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other. 相似文献
28.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly. 相似文献
29.
30.
拦截弹推进及弹道参数的模糊优化研究 总被引:2,自引:0,他引:2
在拦截弹推进系统和弹道参数的设计中 ,引入多目标多约束的模糊优化方法 ,在约束条件一定的情况下 ,合理选择和分配几个重要的设计变量 ,使得拦截弹的总质量最小、拦截时间最短。 相似文献