期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Effect of terminal boundary protection on the spread of computer viruses:modeling and simulation
1
作者 Kai GAO Lixin ZHANG +2 位作者 Yabing YAO Yang YANG Fuzhong NIAN 《Frontiers of Information Technology & Electronic Engineering》 2025年第9期1637-1648,共12页
The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses ... The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent. 展开更多
关键词 Campus network terminal security Spread of computer virus MODEL Analogue simulation terminal protection measures
原文传递
Trust Assessment Under the Integrated Air-Space-Ground Network Environment 被引量:1
2
作者 Zhe Liu Yinghao Yuan +1 位作者 Bo Zhao Xiaoyan Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期405-420,共16页
While playing an increasing role in the field of air-space integrated networks,terminal entities are exposed to more serious security risks than ordinary terminal entities on the ground,including but not limited to as... While playing an increasing role in the field of air-space integrated networks,terminal entities are exposed to more serious security risks than ordinary terminal entities on the ground,including but not limited to astronomical risks(e.g.,solar activity),link disruptions,and malicious attacks.In the integrated air-space-space network,after the terminal entity is loaded into the rocket for launch,real-time monitoring measures are implemented on the ground site for all links to the intended orbit.On top of the real-time monitoring measures,the need for a comprehensive evaluation of the air-space integration network is growing.In this paper,we further classify the security requirements and evaluation benchmarks of the terminal entities of the air-space integration network around the security evaluation requirements of the air-space integration network.On this basis,the relevant concept of trust value is introduced to assess the security status of terminal entities of air-space-sky integrated networks,and on this basis,a security assessment system of air-space-sky integrated network terminals is proposed.The exploration and development of field applications are initially realized. 展开更多
关键词 air-space-ground integrated network terminal security trust elements sensitivity real-time judgment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部