期刊文献+
共找到157篇文章
< 1 2 8 >
每页显示 20 50 100
Multi-missile coordinated penetration strategy based on hierarchical reinforcement learning in reduced space
1
作者 Yaoluo HUI Xiumin LI +2 位作者 Chen LIANG Zenghui ZHANG Jianing YAN 《Chinese Journal of Aeronautics》 2025年第9期304-322,共19页
A group optimal penetration strategy in complex attack and defense confrontation situation is proposed in this paper to solve the coordinated penetration decision-making problem of endo-atmospheric gliding simultaneou... A group optimal penetration strategy in complex attack and defense confrontation situation is proposed in this paper to solve the coordinated penetration decision-making problem of endo-atmospheric gliding simultaneous multi-missile penetration of interceptors.First,the problem of large search space of multi-missile coordinated penetration maneuvers is fully considered,and the flight corridor of multi-missile coordinated penetration is designed to constrain search space of multi-agent coordinated strategy,comprehensively considering path constraints and anticollision constraints of gliding multi-missile flight.Then,a multi-missile hierarchical coordinated decision-making mechanism based on confrontation situation is proposed,and the swarm penetration strategy is optimized with the goal of maximizing swarm penetration effectiveness.The upper layer plans the swarm penetration formation according to confrontation situation,and generates the swarm coordinated penetration trajectory based on Multi-Agent Deep Deterministic Policy Gradient(MADDPG)method.The lower layer interpolates and smooths penetration trajectory,and generates the penetration guidance command based on Soft Actor-Critic and Extended Proportional Guidance(SAC-EPG)method.Simulation results verify that the proposed multi-missile cooperative penetration method based on hierarchical reinforcement learning converges faster than the penetration method based on MADDPG,and can quickly learn multi-missile cooperative penetration skills.In addition,multi-missile coordination can give full play to the group's detection and maneuverability,and occupy favorable penetration time and space through coordinated ballistic maneuvers.Thus the success rate of group penetration can be improved. 展开更多
关键词 Hypersonic glide vehicle multi-missile coordinated penetration Penetration corridor design Cooperative guidance Multi-agent hierarchical reinforcement learning Hierarchical decisionmaking architecture
原文传递
MULTI-FIGHTER COORDINATED MULTI-TARGET ATTACK SYSTEM 被引量:7
2
作者 耿延洛 姜长生 李伟浩 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第1期18-23,共6页
A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the ... A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the neutral network, the decision algorithm is derived and the whole coordinated decision system is simulated. Secondly an algorithm for missile-attacking area is described and its calculational result is obtained under initial conditions. Then the attacking of missile is realized by the proportion guidance. Finally, a multi-target attack system. The system includes airfight decision, estimation of missile attack area and calculation of missile attack procedure. A digital simulation demonstrates that the airfight decision algorithm is correct. The methods have important reference values for the study of fire control system of the fourth generation fighter. 展开更多
关键词 multi-target attack coordinated airfight decision missile attack area priority fire control
在线阅读 下载PDF
Coordinated Bayesian optimal approach for the integrated decision between electronic countermeasure and firepower attack
3
作者 Zheng Tang Xiaoguang Gao Chao Sun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期449-454,共6页
The coordinated Bayesian optimization algorithm(CBOA) is proposed according to the characteristics of the function independence,conformity and supplementary between the electronic countermeasure(ECM) and the firep... The coordinated Bayesian optimization algorithm(CBOA) is proposed according to the characteristics of the function independence,conformity and supplementary between the electronic countermeasure(ECM) and the firepower attack systems.The selection criteria are combinations of probabilities of individual fitness and coordinated degree and can select choiceness individual to construct Bayesian network that manifest population evolution by producing the new chromosome.Thus the CBOA cannot only guarantee the effective pattern coordinated decision-making mechanism between the populations,but also maintain the population multiplicity,and enhance the algorithm performance.The simulation result confirms the algorithm validity. 展开更多
关键词 electronic countermeasure firepower attack coordinated Bayesian optimization algorithm(CBOA).
在线阅读 下载PDF
Research on Coordinated Antisumarine Attack Effeciency of Two Helicopters Under Countermeasures
4
作者 丁红岩 董晓明 蹇明裕 《Defence Technology(防务技术)》 CAS 2012年第1期47-51,共5页
The organization of coordinated attack and the selection of aiming point which affect hit probability were analyzed for the countermeasures taken by the hostile submarines at two helicopters' coordinated attack.A ... The organization of coordinated attack and the selection of aiming point which affect hit probability were analyzed for the countermeasures taken by the hostile submarines at two helicopters' coordinated attack.A computational model of coordinated attack parameters,a model of submarine maneuver,and a model of noise jammer were established.Compared to single helicopter' torpedo attack,the coordinated attack of two helicopters can effectively increase the hit probability of torpedo and achieve the higher target detecting probability under counterwork condition. 展开更多
关键词 analysis on system assessment and feasibility coordinated attack torpedo anti-submarine probability simulation
在线阅读 下载PDF
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
5
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Security Risk Assessment and Risk-oriented Defense Resource Allocation for Cyber-physical Distribution Networks Against Coordinated Cyber Attacks
6
作者 Shuheng Wei Zaijun Wu +2 位作者 Junjun Xu Yanzhe Cheng Qinran Hu 《Journal of Modern Power Systems and Clean Energy》 2025年第1期312-324,共13页
With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components,power distribution networks are subject to miscellaneous security risks induced by ... With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components,power distribution networks are subject to miscellaneous security risks induced by malicious attackers.To address the issue,this paper proposes a security risk assessment method and a risk-oriented defense resource allocation strategy for cyber-physical distribution networks(CPDNs)against coordinated cyber attacks.First,an attack graph-based CPDN architecture is constructed,and representative cyber-attack paths are drawn considering the CPDN topology and the risk propagation process.The probability of a successful coordinated cyber attack and incurred security risks are quantitatively assessed based on the absorbing Markov chain model and National Institute of Standards and Technology(NIST)standard.Next,a risk-oriented defense resource allocation strategy is proposed for CPDNs in different attack scenarios.The tradeoff between security risk and limited resource budget is formulated as a multi-objective optimization(MOO)problem,which is solved by an efficient optimal Pareto solution generation approach.By employing a generational distance metric,the optimal solution is prioritized from the optimal Pareto set of the MOO and leveraged for subsequent atomic allocation of defense resources.Several case studies on a modified IEEE 123-node test feeder substantiate the efficacy of the proposed security risk assessment method and risk-oriented defense resource allocation strategy. 展开更多
关键词 coordinated cyber attack defense resource allocation multi-objective optimization power distribution network security risk assessment
原文传递
Robust Wavelet-Based Facial Image Watermarking Against Geometric Attacks Using Coordinate System Recovery
7
作者 赵培东 谢剑英 《Journal of Beijing Institute of Technology》 EI CAS 2008年第1期46-50,共5页
A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant wate... A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant watermark is adaptively embedded in the discrete wavelet transform(DWT) domain based on the statistical characteristics of the wavelet coefficient block. The coordinate system of watermarked image is reestablished as a calibration system. Regardless of the host image rotated, scaled, or translated(RST), all the geometric attacks are eliminated while the watermarked image is transformed into the standard coordinate system. The proposed watermark detection is a blind detection. Experimental results demonstrate the proposed scheme is robust against common and geometric image processing attacks, particularly its robustness against joint geometric attacks. 展开更多
关键词 digital watermark geometric attacks coordinate system statistical characteristics
在线阅读 下载PDF
基于深度学习的多会话协同攻击加密流量检测技术研究 被引量:3
8
作者 周成胜 孟楠 +1 位作者 赵勋 邱情芳 《信息安全研究》 北大核心 2025年第1期66-73,共8页
恶意加密攻击流量检测是当前网络安全领域的一项重要研究课题.攻击者利用多会话的加密流量实现多阶段协同攻击正在成为一种发展趋势.分析了目前主流恶意加密流量检测方法存在的问题,提出一种面向多会话协同攻击场景的恶意加密流量检测方... 恶意加密攻击流量检测是当前网络安全领域的一项重要研究课题.攻击者利用多会话的加密流量实现多阶段协同攻击正在成为一种发展趋势.分析了目前主流恶意加密流量检测方法存在的问题,提出一种面向多会话协同攻击场景的恶意加密流量检测方法.该方法通过提取多会话特征数据并转换为图像,利用深度学习方法在图像识别领域的优势,将加密流量识别问题转换为图像识别问题,从而间接实现了恶意加密流量检测.基于实验数据的初步测试结果验证了该方法的有效性. 展开更多
关键词 深度学习 加密流量 多会话 协同攻击 网络安全
在线阅读 下载PDF
关键信息基础设施安全防护管理体系研究
9
作者 戴璐 《信息安全研究》 北大核心 2025年第11期993-998,共6页
近年来,以国家关键信息基础设施系统为目标的网络攻击事件快速增长,形势愈发严峻,针对防御薄弱系统的网络攻击已成为关键信息基础设施系统安全防护工作的主要威胁.在日益复杂的网络攻击环境下,构建协同防护机制显得尤为重要.分析了国内... 近年来,以国家关键信息基础设施系统为目标的网络攻击事件快速增长,形势愈发严峻,针对防御薄弱系统的网络攻击已成为关键信息基础设施系统安全防护工作的主要威胁.在日益复杂的网络攻击环境下,构建协同防护机制显得尤为重要.分析了国内外在关键信息基础设施系统安全防护方面的组织管理体系演变和进展,提出了一系列对策建议,旨在为关键信息基础设施安全防护管理体系的工作提供参考. 展开更多
关键词 关键信息基础设施 网络攻击 系统安全 协同防护机制 管理体系
在线阅读 下载PDF
A Defense Planning Model for a Power System Against Coordinated Cyber-physical Attack 被引量:2
10
作者 Peiyun Li Jian Fu +5 位作者 Kaigui Xie Bo Hu Yu Wang Changzheng Shao Yue Sun Wei Huang 《Protection and Control of Modern Power Systems》 SCIE EI 2024年第5期84-95,共12页
This paper proposes a tri-level defense planning model to defend a power system against a coor-dinated cyber-physical attack(CCPA).The defense plan considers not only the standalone physical attack or the cyber attack... This paper proposes a tri-level defense planning model to defend a power system against a coor-dinated cyber-physical attack(CCPA).The defense plan considers not only the standalone physical attack or the cyber attack,but also coordinated attacks.The defense strategy adopts coordinated generation and transmission expansion planning to defend against the attacks.In the process of modeling,the upper-level plan represents the perspective of the planner,aiming to minimize the critical load shedding of the planning system after the attack.The load resources available to planners are extended to flex-ible loads and critical loads.The middle-level plan is from the viewpoint of the attacker,and aims at generating an optimal CCPA scheme in the light of the planning strategy determined by the upper-level plan to maximize the load shedding caused by the attack.The optimal operational behavior of the operator is described by the lower-level plan,which minimizes the load shedding by defending against the CCPA.The tri-level model is analyzed by the column and constraint generation algorithm,which decomposes the defense model into a master problem and subproblem.Case studies on a modified IEEE RTS-79 system are performed to demonstrate the economic effi-ciency of the proposed model. 展开更多
关键词 coordinated cyber-physical attack flexible load column-and-constraint generation defense planning robust optimization.
在线阅读 下载PDF
信息物理协同攻击在新型电力系统中的分析、建模与防御策略综述
11
作者 黄辉辉 魏强 +2 位作者 耿洋洋 吴茜琼 陈昊文 《网络与信息安全学报》 2025年第4期50-72,共23页
新型电力系统信息物理深度融合加剧了网络安全风险,信息物理协同攻击(cyber-physical coordinated attack,CCPA)通过跨域路径对系统的稳定性构成重大威胁。针对新型电力系统信息物理深度融合的特点,对CCPA建立了“攻击特征-建模方法-防... 新型电力系统信息物理深度融合加剧了网络安全风险,信息物理协同攻击(cyber-physical coordinated attack,CCPA)通过跨域路径对系统的稳定性构成重大威胁。针对新型电力系统信息物理深度融合的特点,对CCPA建立了“攻击特征-建模方法-防御策略”三位一体的研究体系。首先,识别新型电力系统面临的攻击类型,构建“感-传-决-控”闭环威胁分析模型,解构CCPA过程的多阶段协同特征与级联失效机理;其次,基于信息-物理域耦合接口威胁分析,构建多维度建模技术分类体系,探讨CCPA在复杂建模中面临的挑战和不同实际场景下的差异性;最后,融合博弈论与多目标优化理论,综述了跨学科、多层次的防御策略框架,并指出其在实际应用中面临的挑战。研究结果可为提升新型电力系统的安全性和韧性提供理论依据和实践指导。 展开更多
关键词 信息物理协同攻击 感-传-决-控 耦合威胁 攻击建模 防御策略 新型电力系统安全
在线阅读 下载PDF
美国漏洞披露机制化协同:动因、策略与镜鉴
12
作者 常宇豪 《情报杂志》 北大核心 2025年第7期77-84,94,共9页
[研究目的]网络安全漏洞披露是缓解攻防不平衡态势和降低网络安全风险的重要手段,美国在网络安全漏洞披露管理上已形成一套行之有效的机制。聚焦美国漏洞披露模式演化,分析其网络安全漏洞披露管理情况对完善我国安全漏洞披露机制具有重... [研究目的]网络安全漏洞披露是缓解攻防不平衡态势和降低网络安全风险的重要手段,美国在网络安全漏洞披露管理上已形成一套行之有效的机制。聚焦美国漏洞披露模式演化,分析其网络安全漏洞披露管理情况对完善我国安全漏洞披露机制具有重要意义。[研究方法]通过文本分析法、案例研究法和比较研究法,深入研究了美国漏洞披露机制化协同的动因与策略。[研究结果/结论]克服负责任披露与松散化协同披露之缺陷和漏洞披露形势变化及漏洞政治化、武器化的现实需要是美国漏洞披露机制化协同之动因,其强化监管、畅通渠道、统一标准、奖惩并举、综合平衡等策略,可为我国漏洞披露制度完善提供镜鉴。 展开更多
关键词 漏洞披露 负责任披露 松散化协同 机制化协同 网络攻击 国家安全
在线阅读 下载PDF
基于变电站多重保护配合拒动的电力系统信息物理协同攻击优化建模
13
作者 杨本昊 刘文霞 +4 位作者 刘耕铭 徐业 颜丙锐 石庆鑫 成锐 《电网技术》 北大核心 2025年第9期3937-3947,I0137-I0139,共14页
为深入研究基于诱导保护装置失灵的信息物理协同攻击可能引发的停电后果,更好地保障电网安全,文章提出基于变电站多重保护配合拒动的信息物理协同攻击优化模型。首先,分析了变电站各类保护与断路器动作的控制逻辑,提出协同攻击模式与作... 为深入研究基于诱导保护装置失灵的信息物理协同攻击可能引发的停电后果,更好地保障电网安全,文章提出基于变电站多重保护配合拒动的信息物理协同攻击优化模型。首先,分析了变电站各类保护与断路器动作的控制逻辑,提出协同攻击模式与作用机理;其次,构建基于抽象图的电力系统等效模型,分析信息攻击下保护-断路器-设备的耦合控制逻辑对系统拓扑和状态的影响。同时,为模拟保护拒动造成短路故障的系统级传播效应,建立基于多商品流的二阶段电力系统短路故障传播模型。然后,以系统综合负荷损失最大为攻击目标,以物理、网络攻击点为优化变量,建立协同攻击双层优化模型并基于KKT条件实现求解。最后,以改进的IEEE14节点系统进行仿真分析,得到不同攻击资源下攻击者的最优攻击方案,并进一步评估重点线路和变电站的预先防御对协同攻击策略的影响,研究结果可为电网安全防御提供参考。 展开更多
关键词 信息物理协同攻击 信息篡改 继电保护故障 双层优化模型
原文传递
基于时间协同的反舰导弹攻击战术研究
14
作者 吴帅 《舰船电子工程》 2025年第6期31-35,共5页
针对不同类型反舰导弹在对单舰目标实施时间协同饱和打击的战术策略时,为确保不同战术技术性能的导弹能够同时临空,消除在时间上存在误差较大的问题始终是战术决策过程丞需解决的难题,基于时间协同,建立了不同飞行特性反舰导弹的飞行模... 针对不同类型反舰导弹在对单舰目标实施时间协同饱和打击的战术策略时,为确保不同战术技术性能的导弹能够同时临空,消除在时间上存在误差较大的问题始终是战术决策过程丞需解决的难题,基于时间协同,建立了不同飞行特性反舰导弹的飞行模型及时间修正的数学模型函数,通过研究不同类型反舰导弹实现时间协同打击目标的控制方法,通过算例仿真验证了时间协同模型方法的可行性,对反舰导弹较准确地实施协同作战战术有一定现实意义。 展开更多
关键词 反舰导弹 时间协同 攻击样式 控制技术 飞行模型
在线阅读 下载PDF
无人机集群对地攻击时空协同控制策略 被引量:2
15
作者 黄振 尹航 +1 位作者 童颖裔 张博洋 《工程科学学报》 EI CSCD 北大核心 2024年第9期1565-1573,共9页
针对三维战场环境下无人机集群协同对地打击问题,提出了一种基于预设时间收敛的无人机集群时空协同控制方法.首先,对无人机集群对地攻击任务场景及其相关要素进行了分析,并建立了无人机集群、地面运动目标和攻击问题模型.在问题建模的... 针对三维战场环境下无人机集群协同对地打击问题,提出了一种基于预设时间收敛的无人机集群时空协同控制方法.首先,对无人机集群对地攻击任务场景及其相关要素进行了分析,并建立了无人机集群、地面运动目标和攻击问题模型.在问题建模的基础上,考虑无人机集群的时空协同策略,设计三维空间无人机集群对地攻击的时空协同控制律.所提出的时空协同控制律能够控制无人机集群在指定的时间内到达期望的攻击位置,实现对地面运动目标的时空协同攻击.通过基于李雅普诺夫函数的理论分析,证明了所提出的控制律能够在预设时间条件下使攻击位置误差变量渐进稳定.仿真结果表明,在地面运动目标转弯运动的情况下,所提出的协同控制律能够实现无人机集群的时空协同,在指定的时间内完成对地面运动目标的多角度协同攻击. 展开更多
关键词 无人机集群 对地攻击 时空协同 地面运动目标 预设时间
在线阅读 下载PDF
电力信息物理系统跨域攻击协同防御架构及机制研究 被引量:7
16
作者 张涛 费稼轩 +2 位作者 王琦 邵志鹏 蔡星浦 《电子学报》 EI CAS CSCD 北大核心 2024年第4期1205-1218,共14页
我国电力基础设施已经发展成为具有高度信息化、自动化、智能化特征的信息物理融合系统.信息-物理交互在显著提升电力供给效率和性能的同时,也引入了新型网络安全威胁,通过发生于信息域并明确作用于物理域的跨域攻击,可造成电力基础设... 我国电力基础设施已经发展成为具有高度信息化、自动化、智能化特征的信息物理融合系统.信息-物理交互在显著提升电力供给效率和性能的同时,也引入了新型网络安全威胁,通过发生于信息域并明确作用于物理域的跨域攻击,可造成电力基础设施系统性瘫痪,继而引发大面积停电事故,而当前孤立的信息侧或物理侧防御体系难以有效应对跨域攻击威胁.本文介绍了电力系统面临的信息物理跨域攻击威胁现状,分析了传统防御方法面对跨域攻击时存在的不足,提出了一种信息物理协同的跨域攻击防御架构,在针对跨域攻击传播的不同阶段,从感知、辨识、阻断三个角度设计了防御方法,通过算例验证了所提信息物理协同防御架构能够有效保障电力系统安全稳定运行. 展开更多
关键词 电力信息物理系统 信息物理协同 跨域攻击 协同防御 知识-数据驱动 电力系统安全
在线阅读 下载PDF
考虑故障跨域传播的配电网CPS协同防御策略 被引量:2
17
作者 丁志龙 张亚超 谢仕炜 《电网技术》 EI CSCD 北大核心 2024年第12期5129-5137,I0066,I0067,I0065,共12页
通信设备的广泛应用导致配电网信息物理系统(cyber physical system,CPS)受到跨域攻击的风险不断增大。据此,提出考虑信息物理协同攻击的配电网CPS韧性提升策略。首先,为分析信息-物理耦合下的故障传播机理,针对配网构造虚拟故障传播网... 通信设备的广泛应用导致配电网信息物理系统(cyber physical system,CPS)受到跨域攻击的风险不断增大。据此,提出考虑信息物理协同攻击的配电网CPS韧性提升策略。首先,为分析信息-物理耦合下的故障传播机理,针对配网构造虚拟故障传播网络辨识其故障、非故障区域;针对通信网构造虚拟信息流网络辨识信息节点的工作状态,并采用信息-物理耦合约束描述故障在配网和通信网之间的跨域传播过程。然后,建立基于防御-攻击-防御三层框架的鲁棒优化模型,其中,第一层防御者制定配电网远动开关配置及通信网加固方案;第二层攻击者寻找最严重的协同攻击方式;第三层防御者通过远动开关动作将配网重构为多个微电网以尽可能减少失电损失。采用嵌套列约束生成算法求解上述模型。最后,通过算例验证了模型的有效性。 展开更多
关键词 韧性提升 信息物理协同攻击 远动开关配置 通信网加固 鲁棒优化
原文传递
无界DoS攻击下的IPv6网络多层协同防御模型构建 被引量:1
18
作者 吴元树 林少晶 《重庆科技学院学报(自然科学版)》 CAS 2024年第3期68-74,共7页
由于无界DoS攻击具有高度的隐蔽性和复杂性,单层防御无法解决入侵问题,因此构建了无界DoS攻击下的IPv6网络多层协同防御模型。根据协同防御思想,构建IPv6网络多层协同防御模型;收集模块流量,利用DNN模型对IPv6网络流量异常情况进行检测... 由于无界DoS攻击具有高度的隐蔽性和复杂性,单层防御无法解决入侵问题,因此构建了无界DoS攻击下的IPv6网络多层协同防御模型。根据协同防御思想,构建IPv6网络多层协同防御模型;收集模块流量,利用DNN模型对IPv6网络流量异常情况进行检测;引入协同式HCF自学习算法,以实现IPv6网络防御信息共享与异常网络流量过滤;利用攻击受损关联度的强化学习算法进行IPv6网络防御。实验结果表明,该模型可在2 ms内恢复CPU;在遭受不同类型的DoS攻击后IPv6网络吞吐量始终高于200 KiB s。这说明该模型可有效抵御不同类型的DoS攻击,反应迅速,防御效果好。 展开更多
关键词 无界DoS攻击 IPV6网络 协同防御 深度神经网络 攻击源追踪
在线阅读 下载PDF
数字化反应堆保护系统信息安全与功能安全协调设计研究
19
作者 夏丹阳 孙永胜 +1 位作者 谭平 刘汪平 《核科学与工程》 CAS CSCD 北大核心 2024年第5期1148-1154,共7页
本文主要针对核电厂数字化反应堆保护系统(RPS)信息安全与功能安全协调设计进行研究。首先进行数字化RPS攻击树建模,定性和定量分析数字化RPS信息安全威胁,提出信息安全威胁对数字化RPS可靠性影响的量化评估方法。然后,综合考虑信息安... 本文主要针对核电厂数字化反应堆保护系统(RPS)信息安全与功能安全协调设计进行研究。首先进行数字化RPS攻击树建模,定性和定量分析数字化RPS信息安全威胁,提出信息安全威胁对数字化RPS可靠性影响的量化评估方法。然后,综合考虑信息安全与功能安全协调要求,从整体结构设计、单个子系统设计两个层面阐述协调设计原则,提出数字化RPS信息安全与功能安全协调设计方法和安全防护措施,使信息安全威胁对数字化RPS可靠性的影响降低到可接受程度。本文研究内容可用于指导数字化RPS设计。 展开更多
关键词 信息安全 反应堆保护系统 攻击树 防护设计 协调要求
在线阅读 下载PDF
基于DDPG算法的智能水雷协同攻击方法
20
作者 蒋平 李加强 彭荆明 《舰船电子工程》 2024年第10期151-154,共4页
智能化是近年来水雷技术发展的重点方向,而具备协同攻击能力是水雷集群智能化的典型特征。论文针对水雷作战中的典型任务场景,基于深度确定性策略梯度网络(DDPG)的强化学习算法,设计了实时和终端两种奖励函数,提高了算法的训练有效性,... 智能化是近年来水雷技术发展的重点方向,而具备协同攻击能力是水雷集群智能化的典型特征。论文针对水雷作战中的典型任务场景,基于深度确定性策略梯度网络(DDPG)的强化学习算法,设计了实时和终端两种奖励函数,提高了算法的训练有效性,并通过仿真实验验证。实验结果表明,智能水雷集群在完成训练后,能够较好地执行协同截击、围攻、拦截等攻击任务,可有效提升水雷作战效能。 展开更多
关键词 智能水雷 协同攻击 深度强化学习 策略梯度
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部