基于安全经络图元诱因治疗的数学模型分析

网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点....

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 7; no. 4; p. 498
Main Authors TANG, Wei, Yu-Ling, CHEN, Yi-Xian, YANG, Xin-Xin, NIU, 汤卫, 陈玉玲, 杨义先, 钮心忻
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.01.2020
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000384

Cover

Loading…
Abstract 网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点.
AbstractList 网络系统的安全是影响系统运作的核心问题,一般将系统的不安全事件转化为独立的病变元诱因进行分析,然后借助有效的治疗策略来保障系统的安全.对元诱因实施治疗,首先利用元诱因属性来构建诱因函数和治疗函数,并结合治疗概率矩阵和状态转移中的不安全熵及效益变化趋势建立数学模型;其次利用剔除劣势策略的原理寻找最佳策略组合,以此来实现对系统安全经络图的有效控制;最后在元诱因治疗的数学模型基础上,探究元诱因治疗的执行思路和策略路径,并根据治疗模型进行模拟仿真和分析.结果表明,基于不安全熵和效益计算的元诱因治疗模型具有实用可行的特点.
Author Yu-Ling, CHEN
Xin-Xin, NIU
陈玉玲
汤卫
杨义先
TANG, Wei
钮心忻
Yi-Xian, YANG
Author_xml – sequence: 1
  givenname: Wei
  surname: TANG
  fullname: TANG, Wei
– sequence: 2
  givenname: CHEN
  surname: Yu-Ling
  fullname: Yu-Ling, CHEN
– sequence: 3
  givenname: YANG
  surname: Yi-Xian
  fullname: Yi-Xian, YANG
– sequence: 4
  givenname: NIU
  surname: Xin-Xin
  fullname: Xin-Xin, NIU
– sequence: 5
  fullname: 汤卫
– sequence: 6
  fullname: 陈玉玲
– sequence: 7
  fullname: 杨义先
– sequence: 8
  fullname: 钮心忻
BookMark eNotzbtKw1AcgPEzVLDWvoCrc-L_XHIuoxRvUHDpXnJOTqBRkprYJ9CKIqhLFaxUXaSL17EFn8aT-BgKOn3b71tCtTRLLUIrGHxMJZdriW_SvZ6fmNwHACpZDdUJKOExjPkiahZFT0MQcCoJw3Wk3P3sa3bhXs7ccFrNL6v5nRt_uuHR9-u7Gz-UH_Pq-qa6PS5Hb-75qZw-usm5Oz0pJ1fLaCEO9wvb_G8DdTY3Oq1tr727tdNab3v9QEpPAQbDOGitpI0pCM6lwEQIHWgtwpCy2IDlhFgTxljRSMUs1JZaiY2IWEQbaPWP7efZwcAWh90kG-Tp77FLpFIUsOKc_gCJwl5x
ContentType Journal Article
Copyright 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000384
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p588-9010c460bb98ef30766871277b5bb7aa34fc0e622ecaf193d9f4abe3e81c7d4d3
ISSN 2097-4116
IngestDate Mon Jun 30 15:03:34 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 4
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p588-9010c460bb98ef30766871277b5bb7aa34fc0e622ecaf193d9f4abe3e81c7d4d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2899301966
PQPubID 6503834
ParticipantIDs proquest_journals_2899301966
PublicationCentury 2000
PublicationDate 20200101
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – month: 01
  year: 2020
  text: 20200101
  day: 01
PublicationDecade 2020
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2020
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.1835992
Snippet ...
SourceID proquest
SourceType Aggregation Database
StartPage 498
SubjectTerms Entropy
Mathematical analysis
Mathematical models
Security
Therapy
Title 基于安全经络图元诱因治疗的数学模型分析
URI https://www.proquest.com/docview/2899301966
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LjtMw0CrdCxcEAsRjQXvAx5Q0cRL7mBRXBZWCUCu6pyoPRxSksirtgb3CIhAScAEkFi1wQXvhedxKfA1pufAPjJ00rWgFLBdrNI49ccbxjMczHoTOOYERUxaHmqBOpJG4LDTfj2ItBNHhg8QyIxWVdrlh11rkUttqFwo_57yWhoOgFG4ujSv5H64CDvgqo2T3wdm8U0AADPyFEjgM5T_xGHMLsyr2XMyJLCmXGJdjyiRAAaaYO9jzMK1mAKuoVh72ePYMNTGn2IV-ylmVq2NuY8-Qz0MrZmPmKABIEFnFLOzpitYF7NoSA4TctDlQ91TPFFNVBZg0V-cSJbjSv7sxSNff3AkwNya4aTzVddHN16ahVs-SsFRqPD9FWu9q7W5qyV13G3m2sHa3B_g0oOxia96-Yei_2TdkGnEh72iZzVblgLns_dJDh78PQS2vhs4cjZTTSM-pLHDmpjyZW9dJmip7Qd6Y1KZK4IS9W93SzbBfUmetZCZdpx4FjSudaqte7zR5u3kArRiwqzGKaMXjjavXpgugvKyNGjP91ILeqaE8I_K3zQK_JOHzC2QXFAqlJTUPo0PZZ1lz07l6BBU2bxxFLHmz933vSfLxUbK1Oxk9nYxeJ9vfkq17Pz59Sbbfjr-OJi9eTl7dHz__nHx4P959l-w8Th4-GO88O4aaVd6s1LQsZYe2YcHPKX19QmLrQcCoiEF82DZsyGGsgRUEju-bJA51YRuGCP0Ytg4Ri4kfCFPQcuhEJDKPo2Lvdk-cQGuhGekB7H2DWIQE2vmCMcNhka0LZjJKT6LV6VA72S95pyOtB6a88ck-9efq0-jgbK6touKgPxRnQLscBGcznvwCdOF5sA
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%9F%BA%E4%BA%8E%E5%AE%89%E5%85%A8%E7%BB%8F%E7%BB%9C%E5%9B%BE%E5%85%83%E8%AF%B1%E5%9B%A0%E6%B2%BB%E7%96%97%E7%9A%84%E6%95%B0%E5%AD%A6%E6%A8%A1%E5%9E%8B%E5%88%86%E6%9E%90&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=TANG%2C+Wei&rft.au=Yu-Ling%2C+CHEN&rft.au=Yi-Xian%2C+YANG&rft.au=Xin-Xin%2C+NIU&rft.date=2020-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=7&rft.issue=4&rft.spage=498&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000384&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon