排序方式: 共有199条查询结果,搜索用时 31 毫秒
121.
针对指挥控制关系网络受到攻击时节点及网络毁伤程度的量化评价问题,首先形式化定义了攻击强度和节点自修复能力函数,在此基础上,分别给出了网络中节点无自修复能力和自修复能力随时间变化时的节点毁伤模型。最后通过仿真计算,得到了节点的失效过程描述以及随机攻击和选择性攻击两种不同攻击目标选择方式下网络效率随攻击时间的变化关系。 相似文献
122.
大气层高层作战的动能拦截器多采用侧窗探测的结构布局,侧窗定向方位对其拦截效果有重要的影响,但定向方位的选择却受诸多因素制约.在一定理想化假设的基础上,研究了末段交战过程中视线转率的变化规律,从理论上分析了由侧窗定向产生的攻角对拦截结果的影响,得到了只考虑气动力影响下的最佳定向方位;然后综合考虑气动力、轨控系统、姿控系统的影响,给出了不同作战高度下侧窗定向方位的选择方法.数字仿真结果表明,此种方法能够满足侧窗探测的要求,且在大多数情况下只需一次定向即可完成拦截. 相似文献
123.
结合量子计算算子提出一种基于极化单光子的量子秘密共享协议.该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击.通过对置换算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性. 相似文献
124.
125.
126.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献
127.
128.
129.
130.