排序方式: 共有6条查询结果,搜索用时 125 毫秒
1
1.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method. 相似文献
2.
对二次检测立方攻击预处理阶段的提取二次表达式的算法进行了改进以优化攻击效率。将秘密变量的变化引入攻击中,使得攻击模型更加灵活;同时,利用时空折中的思想,通过存储常数项和一次项的计算结果,有效降低二次项的计算量。将改进的方法应用于简化版的PRESENT算法和Trivium算法上,攻击效率有显著提高。 相似文献
3.
Timothy J. Junio 《战略研究杂志》2013,36(1):125-133
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed. 相似文献
4.
5.
本文通过对主被动声自导鱼雷攻击弹道(水平面)几种方式的分析,取长补短,提出了综合攻击弹道的方案,即初始为尾追方式,最后为固定提前角方式攻击。并通过计算机仿真,获得了与世界先进雷取得一致的最佳调整方案。此外,本方案为其它尾追方式攻击的鱼雷提供了改进攻击弹道的依据。 相似文献
6.
1