基于安全经络图元诱因治疗的数学模型分析
网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点....
Saved in:
Published in | Journal of Cryptologic Research Vol. 7; no. 4; p. 498 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.01.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000384 |
Cover
Loading…
Abstract | 网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点. |
---|---|
AbstractList | 网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点. |
Author | Yu-Ling, CHEN Xin-Xin, NIU 陈玉玲 汤卫 杨义先 TANG, Wei 钮心忻 Yi-Xian, YANG |
Author_xml | – sequence: 1 givenname: Wei surname: TANG fullname: TANG, Wei – sequence: 2 givenname: CHEN surname: Yu-Ling fullname: Yu-Ling, CHEN – sequence: 3 givenname: YANG surname: Yi-Xian fullname: Yi-Xian, YANG – sequence: 4 givenname: NIU surname: Xin-Xin fullname: Xin-Xin, NIU – sequence: 5 fullname: 汤卫 – sequence: 6 fullname: 陈玉玲 – sequence: 7 fullname: 杨义先 – sequence: 8 fullname: 钮心忻 |
BookMark | eNotzbtKw1AcgPEzVLDWvoCrc-L_XHIuoxRvUHDpXnJOTqBRkprYJ9CKIqhLFaxUXaSL17EFn8aT-BgKOn3b71tCtTRLLUIrGHxMJZdriW_SvZ6fmNwHACpZDdUJKOExjPkiahZFT0MQcCoJw3Wk3P3sa3bhXs7ccFrNL6v5nRt_uuHR9-u7Gz-UH_Pq-qa6PS5Hb-75qZw-usm5Oz0pJ1fLaCEO9wvb_G8DdTY3Oq1tr727tdNab3v9QEpPAQbDOGitpI0pCM6lwEQIHWgtwpCy2IDlhFgTxljRSMUs1JZaiY2IWEQbaPWP7efZwcAWh90kG-Tp77FLpFIUsOKc_gCJwl5x |
ContentType | Journal Article |
Copyright | 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000384 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p588-9010c460bb98ef30766871277b5bb7aa34fc0e622ecaf193d9f4abe3e81c7d4d3 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:03:34 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 4 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p588-9010c460bb98ef30766871277b5bb7aa34fc0e622ecaf193d9f4abe3e81c7d4d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2899301966 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2899301966 |
PublicationCentury | 2000 |
PublicationDate | 20200101 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – month: 01 year: 2020 text: 20200101 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2020 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.1835992 |
Snippet | ... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 498 |
SubjectTerms | Entropy Mathematical analysis Mathematical models Security Therapy |
Title | 基于安全经络图元诱因治疗的数学模型分析 |
URI | https://www.proquest.com/docview/2899301966 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LjtMw0CrdCxcEAsRjQXvAx5Q0cRL7mBRXBZWCUCu6pyoPRxSksirtgb3CIhAScAEkFi1wQXvhedxKfA1pufAPjJ00rWgFLBdrNI49ccbxjMczHoTOOYERUxaHmqBOpJG4LDTfj2ItBNHhg8QyIxWVdrlh11rkUttqFwo_57yWhoOgFG4ujSv5H64CDvgqo2T3wdm8U0AADPyFEjgM5T_xGHMLsyr2XMyJLCmXGJdjyiRAAaaYO9jzMK1mAKuoVh72ePYMNTGn2IV-ylmVq2NuY8-Qz0MrZmPmKABIEFnFLOzpitYF7NoSA4TctDlQ91TPFFNVBZg0V-cSJbjSv7sxSNff3AkwNya4aTzVddHN16ahVs-SsFRqPD9FWu9q7W5qyV13G3m2sHa3B_g0oOxia96-Yei_2TdkGnEh72iZzVblgLns_dJDh78PQS2vhs4cjZTTSM-pLHDmpjyZW9dJmip7Qd6Y1KZK4IS9W93SzbBfUmetZCZdpx4FjSudaqte7zR5u3kArRiwqzGKaMXjjavXpgugvKyNGjP91ILeqaE8I_K3zQK_JOHzC2QXFAqlJTUPo0PZZ1lz07l6BBU2bxxFLHmz933vSfLxUbK1Oxk9nYxeJ9vfkq17Pz59Sbbfjr-OJi9eTl7dHz__nHx4P959l-w8Th4-GO88O4aaVd6s1LQsZYe2YcHPKX19QmLrQcCoiEF82DZsyGGsgRUEju-bJA51YRuGCP0Ytg4Ri4kfCFPQcuhEJDKPo2Lvdk-cQGuhGekB7H2DWIQE2vmCMcNhka0LZjJKT6LV6VA72S95pyOtB6a88ck-9efq0-jgbK6touKgPxRnQLscBGcznvwCdOF5sA |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%9F%BA%E4%BA%8E%E5%AE%89%E5%85%A8%E7%BB%8F%E7%BB%9C%E5%9B%BE%E5%85%83%E8%AF%B1%E5%9B%A0%E6%B2%BB%E7%96%97%E7%9A%84%E6%95%B0%E5%AD%A6%E6%A8%A1%E5%9E%8B%E5%88%86%E6%9E%90&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=TANG%2C+Wei&rft.au=Yu-Ling%2C+CHEN&rft.au=Yi-Xian%2C+YANG&rft.au=Xin-Xin%2C+NIU&rft.date=2020-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=7&rft.issue=4&rft.spage=498&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000384&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |