排序方式: 共有200条查询结果,搜索用时 15 毫秒
121.
122.
针对指挥控制关系网络受到攻击时节点及网络毁伤程度的量化评价问题,首先形式化定义了攻击强度和节点自修复能力函数,在此基础上,分别给出了网络中节点无自修复能力和自修复能力随时间变化时的节点毁伤模型。最后通过仿真计算,得到了节点的失效过程描述以及随机攻击和选择性攻击两种不同攻击目标选择方式下网络效率随攻击时间的变化关系。 相似文献
123.
大气层高层作战的动能拦截器多采用侧窗探测的结构布局,侧窗定向方位对其拦截效果有重要的影响,但定向方位的选择却受诸多因素制约.在一定理想化假设的基础上,研究了末段交战过程中视线转率的变化规律,从理论上分析了由侧窗定向产生的攻角对拦截结果的影响,得到了只考虑气动力影响下的最佳定向方位;然后综合考虑气动力、轨控系统、姿控系统的影响,给出了不同作战高度下侧窗定向方位的选择方法.数字仿真结果表明,此种方法能够满足侧窗探测的要求,且在大多数情况下只需一次定向即可完成拦截. 相似文献
124.
125.
制导炸弹--一种重要的空袭兵器和应对措施 总被引:1,自引:0,他引:1
根据越南战争、海湾战争和科索沃战争的战例,阐述了制导炸弹的主要战术技术特点,认为制导炸弹是未来空袭作战重要兵器,是中低空中近程地(舰)空导弹的重要目标,拦截制导炸弹是地(舰)空导弹应该着力研究的问题.论证了中低空中近程地(舰)空导弹拦截制导炸弹的可行性,并提出了应开展的专项技术研究课题. 相似文献
126.
鱼雷命中后舰船的载荷计算和剩余强度评估 总被引:4,自引:2,他引:2
以某舰船为例,计算了鱼雷在舰船底部非接触爆炸使舰体结构产生破损后由于进水引起的浮态和载荷变化,给出了鱼雷命中破损后波浪弯矩随不同破损部位、不同进水体积的变化规律.计算了破损舰船的弹塑性极限弯矩,并对舰船的剩余强度进行了评估.计算结果表明,鱼雷命中的最危险位置是船中,外载荷的增大和结构承载能力的减小使舰体结构在单发命中时也可能失效. 相似文献
127.
128.
129.
结合差分统计分析方法,引入方差分析假设检验,提出一种可行的计时攻击算法,并针对RSA算法的软件应用进行攻击实验。实验结果表明,该攻击算法不仅比传统攻击方式具有更高的可行性,而且能够适用于不同密钥长度的攻击。 相似文献
130.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献