期刊文献+
共找到5,466篇文章
< 1 2 250 >
每页显示 20 50 100
Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
1
作者 Limei Liang Rong Su Haotian Xu 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期261-263,共3页
Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded... Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields. 展开更多
关键词 cyber physical systems refrigeration system traffic network dos attacks distributed state fault estimation embedded computing power system distributed state estimation
在线阅读 下载PDF
Event-Based Networked Predictive Control of Cyber-Physical Systems with Delays and DoS Attacks
2
作者 Wencheng Luo Pingli Lu +1 位作者 Changkun Du Haikuo Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第6期1295-1297,共3页
Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networ... Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networked predictive control(NPC)approach,an event-based NPC method is proposed.Within the proposed method,the negative effects of time-varying delays and DoS attacks on system performance are compensated.Then,sufficient and necessary conditions are derived to ensure the stability of the closed-loop system.In the end,simulation results are provided to demonstrate the validity of presented method. 展开更多
关键词 cyber physical systems dos attacks necessary conditions derived denial service attacks time varying delays event based networked predictive control stabilization control calculation overload
在线阅读 下载PDF
Broad-Learning-System-Based Model-Free Adaptive Predictive Control for Nonlinear MASs Under DoS Attacks
3
作者 Hongxing Xiong Guangdeng Chen +1 位作者 Hongru Ren Hongyi Li 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期381-393,共13页
In this paper, the containment control problem in nonlinear multi-agent systems(NMASs) under denial-of-service(DoS) attacks is addressed. Firstly, a prediction model is obtained using the broad learning technique to t... In this paper, the containment control problem in nonlinear multi-agent systems(NMASs) under denial-of-service(DoS) attacks is addressed. Firstly, a prediction model is obtained using the broad learning technique to train historical data generated by the system offline without DoS attacks. Secondly, the dynamic linearization method is used to obtain the equivalent linearization model of NMASs. Then, a novel model-free adaptive predictive control(MFAPC) framework based on historical and online data generated by the system is proposed, which combines the trained prediction model with the model-free adaptive control method. The development of the MFAPC method motivates a much simpler robust predictive control solution that is convenient to use in the case of DoS attacks. Meanwhile, the MFAPC algorithm provides a unified predictive framework for solving consensus tracking and containment control problems. The boundedness of the containment error can be proven by using the contraction mapping principle and the mathematical induction method. Finally, the proposed MFAPC is assessed through comparative experiments. 展开更多
关键词 Broad learning technique denial-of-service(dos) model-free adaptive predictive control(MFAPC) nonlinear multiagent systems(NMASs)
在线阅读 下载PDF
基于BiTCN的无人机指挥控制链路DoS攻击检测方法
4
作者 赵长啸 方玉麟 汪克念 《航空学报》 北大核心 2026年第1期249-265,共17页
无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)... 无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)的攻击检测方法,基于网络数据与物理数据的信息特征融合构建检测数据集,通过时间戳对齐与前向填充,解决网络与物理数据的异步问题;实验基于完整数据集和数据缺失率为5%、15%、30%、40%、50%的数据集展开,利用BiTCN模型通过双向机制捕捉数据的前后文信息,完成特征提取和分类,实现对DoS攻击的检测。将所提方法在真实无人机攻击数据集上进行验证,结果表明:与纯网络数据和纯物理数据检测模型相比,该方法准确率(97.8%)、召回率(95.9%)、F1分数(97.8%)和AUC(0.997)均优于单一维度数据检测模型;与传统FNN、1D-CNN、LSTM、GRU检测模型相比,即使在40%的数据缺失情况下,所提方法仍能保持较高检测精度。 展开更多
关键词 无人机C2链路 dos攻击检测 双向时间卷积网络 网络数据与物理数据融合 攻击检测方法
原文传递
基于重引力搜索的大规模网络DoS入侵检测
5
作者 杨云帆 黄浩 +2 位作者 古振威 马腾腾 王依云 《电子设计工程》 2026年第4期151-154,共4页
针对大规模网络流量数据特征提取性能差、无界DoS入侵检测覆盖率低等问题,提出基于重引力搜索的大规模网络DoS入侵检测方法。提取大规模网络流量数据特征——流量统计特征、流量速率特征、流量分布特征与时间序列特征,以深度学习模型为... 针对大规模网络流量数据特征提取性能差、无界DoS入侵检测覆盖率低等问题,提出基于重引力搜索的大规模网络DoS入侵检测方法。提取大规模网络流量数据特征——流量统计特征、流量速率特征、流量分布特征与时间序列特征,以深度学习模型为工具,构建无界DoS入侵检测模型,通过重引力搜索算法对典型特征自相关参数进行寻优,进而提升无界DoS入侵检测的精准度。实验结果表明,应用该方法后,流量速率曲线与实际流量速率曲线几乎一致,无界DoS入侵检测覆盖率最大值达到95%。大规模网络无界DoS入侵检测效果优异,性能良好。 展开更多
关键词 大规模网络 入侵检测 无界dos攻击 重引力搜索算法
在线阅读 下载PDF
面向车联网DoS攻击的混合入侵检测系统 被引量:2
6
作者 郭健忠 王灿 +1 位作者 谢斌 闵锐 《计算机系统应用》 2025年第3期85-93,共9页
针对车联网中拒绝服务(denial of service,DoS)攻击难以防范且现有监督学习方法无法有效检测零日攻击的问题,提出了一种混合DoS攻击入侵检测系统.首先,对数据集进行预处理,提高数据的质量;其次,利用特征选择滤除冗余特征,旨在获得代表... 针对车联网中拒绝服务(denial of service,DoS)攻击难以防范且现有监督学习方法无法有效检测零日攻击的问题,提出了一种混合DoS攻击入侵检测系统.首先,对数据集进行预处理,提高数据的质量;其次,利用特征选择滤除冗余特征,旨在获得代表性更强的特征;再次,采用集成学习方法将5种基于树结构的监督分类器堆叠集成用于检测已知DoS攻击;最后,提出了一种无监督异常检测方法,将卷积去噪自动编码器与注意力机制相结合来建立正常行为模型,用于检测堆叠集成模型漏报的未知DoS攻击.实验结果表明,对于已知DoS攻击检测,所提系统在Car-Hacking数据集和CICIDS2017数据集上的检测准确率分别为100%和99.967%;对于未知DoS攻击检测,所提系统在上述两个数据集上的检测准确率分别为100%和83.953%,并且在两个数据集上的平均测试时间分别为0.072 ms和0.157 ms,验证了所提系统的有效性和可行性. 展开更多
关键词 车联网 入侵检测 dos攻击 堆叠集成 自动编码器
在线阅读 下载PDF
双端异步DoS攻击下基于数模联动的ICPS多模态综合安全控制
7
作者 李亚洁 李钢 +1 位作者 李炜 路晨静 《北京航空航天大学学报》 北大核心 2025年第10期3354-3367,共14页
针对一类双端异步拒绝服务(DoS)攻击与执行器故障共存的工业信息物理系统(ICPS),通过将数据驱动技术与模型机理解析方法相融合,对多模态综合安全控制与通讯间的协同设计问题进行研究。设计一种触发阈值可随系统行为动态变化的自适应离... 针对一类双端异步拒绝服务(DoS)攻击与执行器故障共存的工业信息物理系统(ICPS),通过将数据驱动技术与模型机理解析方法相融合,对多模态综合安全控制与通讯间的协同设计问题进行研究。设计一种触发阈值可随系统行为动态变化的自适应离散事件触发通讯机制(ADETCS),并构建可同时抵御双端异步DoS攻击与执行器故障的ICPS多模态综合安全控制架构;针对不同能量等级的DoS攻击,采用“分而治之”的思想,借助长短期记忆(LSTM)网络与弹性控制方法,提出基于数模联动的主-被动协同混合容侵策略。基于Lyapunov稳定性理论进行观测器与控制器的推证,进而采用K-Means++聚类算法及模糊融合方法,在线对不同模态下的控制器进行加权融合,实现不同控制模态间的软切换;通过四容水箱实例,验证了双端异步DoS攻击下基于数模联动的多模态综合安全控制方法的正确性。实验结果表明:数模联动的方法增强了ICPS抵御双端异步DoS攻击的能力,多模态综合安全控制器的设计实现了控制模态与ADETCS间的双向自适应协同控制。 展开更多
关键词 工业信息物理系统 双端异步dos攻击 数模联动 自适应离散事件触发通讯机制 多模态综合安全控制
原文传递
用Turbo C的System()函数实现DOS SHELL功能时应注意的一个问题
8
作者 潘瑜 《电脑编程技巧与维护》 1995年第8期23-24,共2页
本刊1994年第一期(创刊号)刊登了《用Turbo C实现SHELL功能》一文,文中给出了利用Turbo C的system()函数实现DOS SHELL功能的方法。具体的说,就是用如下的dosshell()函数实现DOSSHELL功能。 void dosshell()
关键词 C语言 system()函数 dos SHELL
在线阅读 下载PDF
Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks 被引量:8
9
作者 Xianggui Guo Dongyu Zhang +1 位作者 Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第10期1644-1656,共13页
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-d... This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when Do S attacks occur.To save network resources,an adaptive memory event-triggered mechanism(AMETM)is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM's updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality(LMI)technique.Finally,simulation examples show the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive memory event-triggered mechanism(AMETM) compensation mechanism denial-of-service(dos)attacks nonlinear multi-agent systems(MASs) observer-based anti-disturbance control
在线阅读 下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:5
10
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 Cyber-physical power systems(CPPSs) denial-of-service(dos)attacks load frequency control(LFC) sampled-data control
在线阅读 下载PDF
Fully Distributed Resilient Cooperative Control of Vehicular Platoon Systems Under DoS Attacks 被引量:3
11
作者 Lei Ding Jie Li +1 位作者 Maojiao Ye Yuan Zhao 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第5期937-940,共4页
Dear Editor,This letter is concerned with distributed resilient platoon control of multiple vehicles subject to denial-of-service(DoS)attacks.In order to accommodate the effects of DoS attacks,a fully resilient distri... Dear Editor,This letter is concerned with distributed resilient platoon control of multiple vehicles subject to denial-of-service(DoS)attacks.In order to accommodate the effects of DoS attacks,a fully resilient distributed control strategy is presented by designing an adaptive control gain,where any global information of communication topology is no longer required.Then,the conditions of time duration rates and frequency of DoS attacks on stability of vehicular platoons can be characterized.Finally,a numerical simulation example is given to validate the obtained results. 展开更多
关键词 dos SERVICE DESIGNING
在线阅读 下载PDF
Security Control for Uncertain Networked Control Systems under DoS Attacks and Fading Channels 被引量:1
12
作者 Chengzhen Gao Cheng Tan +1 位作者 Hongtao Sun Mingyue Xiang 《Journal of Beijing Institute of Technology》 EI CAS 2022年第4期422-430,共9页
This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remote... This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remotely controls the plant and the control input is transmitted over a fading channel.Meanwhile,considering the sustained attack cycle and frequency of DoS attacks are random,the packet-loss caused by DoS attacks is modelled by a Markov process.The sampled-data NCS is transformed into a stochastic form with Markov jump and uncertain parameter.Then,based on Lyapunov functional method,linear matrix inequality(LMI)-based sufficient conditions are presented to ensure the stability of uncertain NCSs.The main contribution of this article lies in the construction of NCSs based on DoS attacks into Markov jump system(MJS)and the joint consideration of fading channel and plant uncertainty. 展开更多
关键词 networked control systems Denial-of-Service(dos)attacks UNCERTAINTY fading channels Markov jump system
在线阅读 下载PDF
带Markov拓扑的多智能体系统在DoS攻击和DAs下的均方一致性
13
作者 陈钊杰 叶钊显 +2 位作者 高钰博 周霞 马忠军 《应用数学》 北大核心 2025年第3期670-680,共11页
研究具有Markov切换拓扑的非线性多智能体系统在遭受拒绝服务(DoS)攻击和欺骗攻击(DAs)下的领导-跟随均方一致性问题.采用Bernoulli随机变量序列来描述多智能体系统随机受到DoS攻击或DAs.当系统遭受网络攻击时,多智能体之间的网络通讯... 研究具有Markov切换拓扑的非线性多智能体系统在遭受拒绝服务(DoS)攻击和欺骗攻击(DAs)下的领导-跟随均方一致性问题.采用Bernoulli随机变量序列来描述多智能体系统随机受到DoS攻击或DAs.当系统遭受网络攻击时,多智能体之间的网络通讯拓扑的参数和结构发生随机改变,将其建模为Markov切换拓扑.基于随机微分方程和分布式控制理论,应用随机分析方法和Lyapunov直接法,得到系统实现领导-跟随均方一致的充分条件,并通过数值仿真验证了所得结果的正确性和方法的有效性. 展开更多
关键词 非线性多智能体系统 dos攻击 DAS Markov切换拓扑 均方一致性
在线阅读 下载PDF
能量受限DoS攻击下多智能体系统二分一致性控制
14
作者 张金南 胡仲瑞 +2 位作者 汪涵博 董宏丽 孟宪政 《控制与决策》 北大核心 2025年第11期3340-3348,共9页
针对一类离散线性时变的合作-竞争多智能体系统,研究其在能量受限的拒绝服务(DoS)攻击下的二分一致性控制问题.考虑信号于控制器至执行器传输时,遭受敌方蓄意发起能够阻断信息通信的受约束DoS攻击,引入能量收集技术理念,刻画攻击者发起... 针对一类离散线性时变的合作-竞争多智能体系统,研究其在能量受限的拒绝服务(DoS)攻击下的二分一致性控制问题.考虑信号于控制器至执行器传输时,遭受敌方蓄意发起能够阻断信息通信的受约束DoS攻击,引入能量收集技术理念,刻画攻击者发起攻击所需能量的约束,并构建随机发起攻击的模型.通过设计基于观测器的二分一致性控制器,确保遭受能量受限DoS攻击的合作-竞争多智能体系统在给定的有限时域内实现预定的H_(∞)二分一致性.利用李雅普诺夫稳定性理论建立保证期望的H_(∞)二分一致性的充分条件,通过优化技术设计二分一致性控制器方案,并得到控制器和观测器增益.最后,通过一个仿真示例验证所提出的安全二分一致性控制方案的有效性. 展开更多
关键词 二分一致性 合作-竞争 能量受限dos攻击 多智能体系统 有限域 非脆弱控制
原文传递
基于深度学习的车联网的路网监测系统的DoS和DDoS攻击的入侵检测方法 被引量:2
15
作者 曹磊 温蜜 何蔚 《计算机应用与软件》 北大核心 2025年第1期303-311,共9页
面对日益复杂的交通路况,车联网成为提升智能路网监测系统性能的重要保证,它可以实现车载网、车际网、车辆与移动互联网之间的信息交互共享。然而DoS和DDoS网络攻击的频发,成为车联网可用性的严重威胁之一。针对传统入侵检测算法存在训... 面对日益复杂的交通路况,车联网成为提升智能路网监测系统性能的重要保证,它可以实现车载网、车际网、车辆与移动互联网之间的信息交互共享。然而DoS和DDoS网络攻击的频发,成为车联网可用性的严重威胁之一。针对传统入侵检测算法存在训练困难、分类精度低、泛化能力差的问题,提出一种高效的深度学习模型CNN-BiSRU。实验选择在最新的CICIDS2018数据集中进行验证,结果表明,该模型获得了更高的检测精度,而相比于CNN-BiLSTM,CNN-BiSRU拥有更快的检测速度。 展开更多
关键词 入侵检测 dos攻击 深度学习 车联网 路网监测系统
在线阅读 下载PDF
Prediction-Based State Estimation and Compensation Control for Networked Systems With Communication Constraints and DoS Attacks
16
作者 Zhong-Hua Pang Qian Cao +1 位作者 Haibin Guo Zhe Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2352-2354,共3页
Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of whi... Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of which would induce random network delays. 展开更多
关键词 dos SERVICE NETWORK
在线阅读 下载PDF
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
17
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq 《Computers, Materials & Continua》 SCIE EI 2024年第9期3655-3683,共29页
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential... The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments. 展开更多
关键词 Machine learning Internet of Things(IoT) dos Ddos CYBERSECURITY intrusion prevention network security feature optimization sustainability
在线阅读 下载PDF
非周期性DoS攻击下布尔控制网络的镇定控制
18
作者 白博文 王金环 《控制与决策》 北大核心 2025年第7期2168-2174,共7页
针对布尔控制网络在非周期性拒绝服务(DoS)攻击下的镇定控制问题,研究服从独立同分布过程的非周期性DoS攻击.首先,将遭受攻击的布尔控制网络转化为概率布尔网络,进而得到系统能够全局随机稳定的充分必要条件;其次,基于可达集构造方法,... 针对布尔控制网络在非周期性拒绝服务(DoS)攻击下的镇定控制问题,研究服从独立同分布过程的非周期性DoS攻击.首先,将遭受攻击的布尔控制网络转化为概率布尔网络,进而得到系统能够全局随机稳定的充分必要条件;其次,基于可达集构造方法,设计能够保证系统稳定的状态反馈控制器;最后,通过仿真实验验证所提出理论与控制方法的有效性. 展开更多
关键词 矩阵半张量积 布尔控制网络 非周期性dos攻击 独立同分布过程 状态反馈控制 镇定控制
原文传递
基于重要数据的DoS攻击设计和控制在UDS中的应用
19
作者 王茂栋 田恩刚 +1 位作者 王静 瞿枫 《控制工程》 北大核心 2025年第11期2014-2020,共7页
为无人驾驶系统设计了一种新型的攻击-防御框架。首先,从攻击者的角度提出了一种新的拒绝服务(denial of service,DoS)攻击机制,称为基于重要数据(important-databased,IDB)的DoS攻击策略,以增强攻击的破坏性。与现有的大多数DoS攻击策... 为无人驾驶系统设计了一种新型的攻击-防御框架。首先,从攻击者的角度提出了一种新的拒绝服务(denial of service,DoS)攻击机制,称为基于重要数据(important-databased,IDB)的DoS攻击策略,以增强攻击的破坏性。与现有的大多数DoS攻击策略不同,该策略可以拦截输出数据,识别数据的重要程度,并仅对重要数据发起攻击。这样,提出的IDB DoS攻击策略将对无人驾驶系统造成更大的破坏。其次,为了应对IDB DoS攻击策略带来的负面影响,构造了一种新的弹性H_(∞)控制技术来减轻攻击损害。最后,仿真结果表明:①与一些现有的DoS攻击模型相比,所提出的IDB DoS攻击策略对系统具有更大的破坏性;②设计的弹性H_(∞)控制器可以有效地减轻所提出的IDB DoS攻击策略所带来的攻击破坏性。 展开更多
关键词 dos攻击策略 弹性H_∞控制 网络控制系统 无人驾驶系统
原文传递
A Code Correlation Comparison of the DOS and CP/M Operating Systems
20
作者 Robert Zeidman 《Journal of Software Engineering and Applications》 2014年第6期513-529,共17页
For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system developed by Digital Research ... For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system developed by Digital Research Incorporated. In this paper, scientifically tested and accepted forensic analysis mathematical techniques, step-by-step processes, and advanced software code comparison tools are used to compare early versions of the two code bases. The conclusion is reached that no copying of code takes place1. 展开更多
关键词 dos CP/M Copyright INFRINGEMENT SOFTWARE FORENSICS SOFTWARE CORRELATION
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部