期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Vulnerability Model Construction Method Based on Chemical Abstract Machine
1
作者 LI Xiang CHEN Jinfu +4 位作者 LIN Zhechao ZHANG Lin WANG Zibin ZHOU Minmin XIE Wanggen 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期150-162,共13页
It is difficult to formalize the causes of vulnerability, and there is no effective model to reveal the causes and characteristics of vulnerability. In this paper, a vulnerability model construction method is proposed... It is difficult to formalize the causes of vulnerability, and there is no effective model to reveal the causes and characteristics of vulnerability. In this paper, a vulnerability model construction method is proposed to realize the description of vulnerability attribute and the construction of a vulnerability model. A vulnerability model based on chemical abstract machine(CHAM) is constructed to realize the CHAM description of vulnerability model, and the framework of vulnerability model is also discussed. Case study is carried out to verify the feasibility and effectiveness of the proposed model. In addition, a prototype system is also designed and implemented based on the proposed vulnerability model. Experimental results show that the proposed model is more effective than other methods in the detection of software vulnerabilities. 展开更多
关键词 software security vulnerability detection vulner-ability analysis vulnerability model chemical abstract machine
原文传递
Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion accidents 被引量:2
2
作者 Kunlun XIN Tao TAO +1 位作者 Yong WANG Suiqing LIU 《Frontiers of Environmental Science & Engineering》 SCIE EI CAS CSCD 2012年第6期839-848,共10页
In this paper, it proposed an index system for hazard and vulnerability evaluations of water distribution networks, based on the simulation of contamination events caused by pollutant injections at different junctions... In this paper, it proposed an index system for hazard and vulnerability evaluations of water distribution networks, based on the simulation of contamination events caused by pollutant injections at different junctions. It attempted to answer the following two questions in the case of contamination events: 1) Which are the most hazardous junctions? 2) Which are the most vulnerable junctions? With EPANET toolkit, it simulated the propagation of the contaminant, and calculated the peak concentration of the contaminant and mass delivered at different nodes. According to types of consumers, different weights were assigned to the consumer nodes for assessing the influence of the contaminant on the consumers. Using the method proposed herein, both the hazard index and vulnerability index were calculated for each node in the pipe network. The presented method was therefore applied to the water network of the city of Zhenjiang, which contains two water plants, two booster pump stations with storage tanks. In conclusion, the response time, the relationships between the peak concentration of contami- nant and the total absorption are the most important factors in hazard and vulnerability evaluation of the water distribution network. 展开更多
关键词 water distribution network HAZARD vulner-ability contaminant accident
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部