期刊文献+
共找到577篇文章
< 1 2 29 >
每页显示 20 50 100
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:16
1
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
2
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
原文传递
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
3
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
A Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control
4
作者 Arman Sargolzaei Kang K. Yen +2 位作者 Mohamed N. Abdelghani Abolfazl Mehbodniya Saman Sargolzaei 《Intelligent Control and Automation》 2015年第4期205-214,共10页
In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a p... In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reliable and safe from TDS attacks. Here, we introduce a simple method for preventing time delay switch attack on networked control systems. The method relies on an estimator that will estimate and track time delays introduced by an adversary. Knowing the maximum tolerable time delay of the plant’s optimal controller for which the plant remains stable, a time-delay detector issues an alarm signal when the estimated time delay is larger than the minimum one and directs the system to alarm state. In an alarm state, the plant operates under the control of an emergency controller that is local to the plant and remains in this mode until the networked control system state is restored. This method is an inexpensive and simple way to guarantee that an industrial control system remains stable and secure. 展开更多
关键词 time Delay SWITCH attack Load Frequency Control DETECTION and Estimation EMERGENCY CONTROLLER
暂未订购
Design of Time-constrained Guidance Laws via Virtual Leader Approach 被引量:38
5
作者 Zhao Shiyu Zhou Rui +1 位作者 Wei Chen Ding Quanxin 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2010年第1期103-108,共6页
Guidance problems with flight time constraints are considered in this article. A new virtual leader scheme is used for design of guidance laws with time constraints. The core idea of this scheme is to adopt a virtual ... Guidance problems with flight time constraints are considered in this article. A new virtual leader scheme is used for design of guidance laws with time constraints. The core idea of this scheme is to adopt a virtual leader for real missiles to convert a guidance problem with time constraints to a nonlinear tracking problem,thereby making it possible to settle the problem with a variety of control methods. A novel time-constrained guidance (TCG) law, which can control the flight time of missiles to a prescribed time,is designed by using the virtual leader scheme and stability method. The TCG law is a combination of the well-known proportional navigation guidance(PNG) law and the feedback of flight time error. What' s more, this law is free of singularities and hence yields better performances in comparison with optimal guidance laws with time constraints. Nonlinear simulations demonstrate the effectiveness of the proposed law. 展开更多
关键词 GUIDANCE missiles salvo attack time constraint virtual leader
原文传递
Sliding mode control and Lyapunov based guidance law with impact time constraints 被引量:6
6
作者 Xiaojian Zhang Mingyong Liu Yang Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第6期1186-1192,共7页
This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact... This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact time constraints of guidance law(ITCG) is derived by using sliding mode control(SMC) and Lyapunov stability theorem. The expected impact time is realized by using the notion of attack process and estimated time-to-go to design sliding mode surface(SMS). ITCG contains equivalent and discontinuous guidance laws, once state variables arrive at SMS,the equivalent guidance law keeps the state variables on SMS,then the discontinuous guidance law enforces state variables to move and reach SMS. The singularity problem of ITCG is also analyzed. Theoretical analysis and numerical simulation results are given to test the effectiveness of ITCG designed in this paper. 展开更多
关键词 Lyapunov stability sliding mode control impact time salvo attack time-TO-GO guidance law
在线阅读 下载PDF
TDOA-based Sybil attack detection scheme for wireless sensor networks 被引量:5
7
作者 温蜜 李辉 +1 位作者 郑燕飞 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2008年第1期66-70,共5页
As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node w... As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing. 展开更多
关键词 attack detection Sybil attack.time difference of arrival (TDOA) wireless sensor networks (WSN)
在线阅读 下载PDF
Cooperative Guidance for Multimissile Salvo Attack 被引量:86
8
作者 Zhao Shiyu Zhou Rui 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第6期533-539,共7页
Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordination algorithms and local guidance laws are combined together, is proposed. This scheme a... Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordination algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a hierarchical cooperative guidance architecture, which may provide a general solution to the multimissile cooperative guidance problems. In the case of salvo attacks which require missiles to hit the target simultaneously, both centralized and distributed coordination algorithms are derived based on the impact-time-control guidance (ITCG) law. Numerical simulations are performed to demonstrate the effectiveness of the proposed approaches. 展开更多
关键词 COOPERATIVE GUIDANCE impact time constraints multiple missiles salvo attack
原文传递
Further Analysis of Block Ciphers against Timing Attacks
9
作者 LI Wei GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. 展开更多
关键词 timing attacks block ciphers REDUCTION
在线阅读 下载PDF
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
10
作者 Eloi De Chérisey Sylvain Guilley +1 位作者 Olivier Rioul Darshana Jayasinghe 《Journal of Information Security》 2021年第1期1-33,共33页
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation. 展开更多
关键词 Timing attacks Profiling attacks Dirichlet Priors Success Rates
在线阅读 下载PDF
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
11
作者 Arman Sargolzaei Kang Yen +2 位作者 Mohamed Abdelghani Alireza Abbaspour Saman Sargolzaei 《Intelligent Control and Automation》 2017年第3期164-174,共11页
Networked Control Systems (NCSs) have been implemented in several different industries. The integration with advanced communication networks and computing techniques allows for the enhancement of efficiency of industr... Networked Control Systems (NCSs) have been implemented in several different industries. The integration with advanced communication networks and computing techniques allows for the enhancement of efficiency of industrial control systems. Despite all the advantages that NCSs bring to industry, they remain at risk to a spectrum of physical and cyber-attacks. In this paper, we elaborate on security vulnerabilities of NCSs, and examine how these vulnerabilities may be exploited when attacks occur. A general model of NCS designed with three different controllers, i.e., proportional-integral-derivative (PID) controllers, Model Predictive control (MPC) and Emotional Learning Controller (ELC) are studied. Then three different types of attacks are applied to evaluate the system performance. For the case study, a networked pacemaker system using the Zeeman nonlinear heart model (ZHM) as the plant combined with the above-mentioned controllers to test the system performance when under attacks. The results show that with Emotional Learning Controller (ELC), the pacemaker is able to track the ECG signal with high fidelity even under different attack scenarios. 展开更多
关键词 Security of Control Systems DENIAL of Service (DoS) attack time-Delay-Switch (TDS) attack False Data Injection (FDI) attack
暂未订购
Robust first two rounds access driven cache timing attack on AES
12
作者 ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan 《通讯和计算机(中英文版)》 2009年第6期20-25,共6页
关键词 高速缓存 多进程共享 计算机技术 加密方法
在线阅读 下载PDF
Timing Attack Analysis on AA<sub>β</sub>Cryptosystem
13
作者 A. H. A. Ghafar M. R. K. Ariffin 《Journal of Computer and Communications》 2014年第4期1-9,共9页
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys... Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. 展开更多
关键词 TIMING attack Side-Channel attack Public-Key CRYPTOSYSTEM AAβ Public Key CRYPTOSYSTEM
在线阅读 下载PDF
云计算下智能船舶通信网络入侵攻击特征提取 被引量:1
14
作者 潘俊 《舰船科学技术》 北大核心 2025年第11期160-164,共5页
本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;... 本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;构建智能船舶通信网络的无向图模型,使用连续小波变换对该模型的攻击信号实施经验模态特征分解处理,建立出入侵攻击信号模型,将该信号模型的最大信息增益特征视为搜索起点,提取出入侵攻击信号特征。实验结果表明,所提方法的信号分解时频表示效果好、入侵攻击信号识别能力强,入侵攻击信号特征提取完整性强。 展开更多
关键词 云计算环境 船舶通信网络 入侵攻击信号 信号特征提取 时域状态空间
在线阅读 下载PDF
命名数据网络中基于WEASEL算法的协同Interest包泛洪攻击检测方法
15
作者 邢光林 黄英 《中南民族大学学报(自然科学版)》 2025年第5期647-653,共7页
兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算... 兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算法的CIFA检测方法,通过对网络流量时间序列进行预测分类来检测CIFA.仿真结果表明:所提方法可以有效检测CIFA,并在误报率和漏报率方面具有良好的效果. 展开更多
关键词 命名数据网络 协同兴趣包泛洪攻击 WEASEL算法 时间序列分类
在线阅读 下载PDF
核电厂时钟系统的网络安全研究
16
作者 李江海 龙振海 李博远 《自动化仪表》 2025年第9期86-90,共5页
时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基... 时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基础上,从网络安全防护目标出发,分析列举时钟系统遭受攻击后的可能后果。假想若干典型的攻击方式作为防护的基准,并通过搭建测试平台进行模拟验证。根据试验结果和现有标准,提出网络安全防护建议。研究结果表明,至少有三类可行的入侵时钟系统并波及其他核电厂系统的网络攻击方式,因此应加强对时钟系统的网络安全防护。该研究可提升时钟系统在未来核电智能化发展中的可靠性和安全性。 展开更多
关键词 核电厂 时钟系统 网络安全 时间同步攻击 安全监测
在线阅读 下载PDF
虚假数据注入攻击下多四旋翼飞行器预设时间一致性跟踪控制 被引量:1
17
作者 何星晨 李元新 《控制与决策》 北大核心 2025年第8期2615-2624,共10页
针对遭受虚假数据注入(FDI)攻击的多四旋翼飞行器系统,提出基于命令滤波器的预设时间一致性跟踪控制算法.首先,引入命令滤波器并构建误差补偿机制,在避免“复杂度爆炸”的同时移除滤波误差对系统的影响;其次,基于系统真实状态与受损状... 针对遭受虚假数据注入(FDI)攻击的多四旋翼飞行器系统,提出基于命令滤波器的预设时间一致性跟踪控制算法.首先,引入命令滤波器并构建误差补偿机制,在避免“复杂度爆炸”的同时移除滤波误差对系统的影响;其次,基于系统真实状态与受损状态之间的联系,引入坐标变换并结合Nussbaum函数控制方法和自适应控制技术,解决FDI攻击产生的未知控制增益问题;接着,利用Lyapunov稳定性理论证明系统预设时间稳定、闭环系统中的所有信号有界以及多四旋翼飞行器的一致性跟踪误差在预设时间内收敛到原点附近的邻域内;最后,通过仿真算例验证所提出控制算法的有效性. 展开更多
关键词 多四旋翼飞行器 FDI攻击 预设时间控制 一致性跟踪控制 命令滤波器 NUSSBAUM函数
原文传递
反辐射导弹对地攻击中的目标在线估计与协同制导方法
18
作者 安雅茹 王辉 +1 位作者 刘叙含 杨凯 《弹道学报》 北大核心 2025年第4期67-76,共10页
反辐射导弹被动雷达导引头仅能获取目标角度信息,无法测量相对距离,致使目标位置和速度估计精度不足,从而制约打击效能。与此同时,多弹协同打击作为提升敌方雷达摧毁效率的主流作战模式,面临三维协同制导中的通道耦合等挑战。针对上述问... 反辐射导弹被动雷达导引头仅能获取目标角度信息,无法测量相对距离,致使目标位置和速度估计精度不足,从而制约打击效能。与此同时,多弹协同打击作为提升敌方雷达摧毁效率的主流作战模式,面临三维协同制导中的通道耦合等挑战。针对上述问题,利用单弹高精度定位与测速信息,采用扩展卡尔曼滤波(extended Kalman filter,EKF)算法实现对目标状态的估计;融合多弹分布式测量数据,采用集中式EKF算法实现多弹协同估计,并对比了纯被动、主动及主被动复合3种导引头配置下的EKF估计精度。同时研究了一种具有攻击角度约束的时间协同制导律,通过设计协同平面和追踪平面,将三维制导律设计转化为二维制导律设计,实现了导弹俯仰通道和偏航通道的解耦;在此基础上构建“在线估计—实时制导”的闭环系统,实现边估计边制导,有效规避误差累积。仿真结果表明,所提出的EKF结合多弹融合方法能够将目标估计位置误差降低50%,收敛速度明显提升,所设计的制导律可实现对雷达目标的有效协同打击,为反辐射导弹的协同制导律设计提供技术支撑。 展开更多
关键词 反辐射导弹 目标估计 协同估计 攻击角度约束 攻击时间约束
在线阅读 下载PDF
基于变幂次滑模的三维固定时间的多导弹打击比例导引律
19
作者 李健 刘鹏 +4 位作者 喻小昊 于航 李长生 史云雷 张合 《兵工学报》 北大核心 2025年第7期282-292,共11页
针对多导弹对重要目标同时攻击的问题,提出一种三维固定时间打击多弹比例导引律。建立三维空间内的导弹-目标动力学模型,为降低在三维空间内控制方法的设计难度,在三维空间内确定基准面,将导弹-目标三维空间状态向量分解平行和垂直于基... 针对多导弹对重要目标同时攻击的问题,提出一种三维固定时间打击多弹比例导引律。建立三维空间内的导弹-目标动力学模型,为降低在三维空间内控制方法的设计难度,在三维空间内确定基准面,将导弹-目标三维空间状态向量分解平行和垂直于基准面两个分量,并在上述基准面内分别设计控制方法。其中,平行于基准面基于比例导引法,设计切向和法向加速度作为控制输入,驱使导弹在期望攻击时刻之前达成剩余飞行时间一致;在垂直基准面,基于变幂次改进传统滑模控制法设计导引律,实现多导弹系统前段控制快速收敛与末段控制稳定的兼容。当两个基准面分量都能在预设攻击时间内实现一致性控制时,在三维空间内多导弹系统可完成同步攻击。通过向所设计的导引律中补偿各导弹发射时延,实现多弹系统在异步发射场景下对目标的同步攻击。仿真验证结果表明,所设计的导引律具备快速收敛、稳定性高等特点,不仅适用于同步发射场景,在异步发射时只需将各发导弹发射时延补充至输入端,即可完成攻击时间一致性控制。 展开更多
关键词 导弹 变幂次滑模控制 比例导引律 固定时间打击 三维攻击场景
在线阅读 下载PDF
基于攻击行为链的网络安全态势预测技术
20
作者 李德军 黄金涛 +1 位作者 陈海英 吉庆兵 《信息安全与通信保密》 2025年第8期40-49,共10页
后续网络攻击预测是网络安全态势预测的关键性、典型性环节,同时也是实施难度极高的环节,其预测模型的效能直接决定着能否准确判别后续的潜在攻击行为和复合网络攻击行为,为提前部署网络防御措施和调整安全策略提供有效支撑。针对高级... 后续网络攻击预测是网络安全态势预测的关键性、典型性环节,同时也是实施难度极高的环节,其预测模型的效能直接决定着能否准确判别后续的潜在攻击行为和复合网络攻击行为,为提前部署网络防御措施和调整安全策略提供有效支撑。针对高级持续性威胁(Advanced Persistent Threat,APT)难以被提前发现的问题,提出一种基于攻击行为链的网络安全态势预测技术,构建多步攻击预测模型。采用基于对抗性战术、技术与通用知识框架(Adversarial Tactics,Techniques,and Common Knowledge Framework,ATT&CK)分析矩阵构建攻击序列集合,进一步结合半监督的时序预测和异常识别,对网络安全态势事件序列进行学习,从而提前获得网络攻击预警信息,实现从被动响应转向主动防御,有助于构建更加稳健、反应快速的安全防御体系。 展开更多
关键词 行为链 时间序列分析 攻击预测 马尔可夫决策 序列到序列模型
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部