共查询到19条相似文献,搜索用时 140 毫秒
1.
计算机脆弱性分类的研究 总被引:1,自引:1,他引:1
脆弱性是复杂网络系统的固有本性,是网络攻防的焦点。通过对计算机脆弱性分类的研究,有助于增强人们对脆弱性本质的理解并加以消除。介绍了计算机脆弱性研究的现状及常见的几种分类法,阐述了一种综合了前人研究成果的多维度的脆弱性分类方法。 相似文献
2.
软件脆弱性是系统安全受到各种威胁的根本原因,对软件脆弱性进行科学、合理、有实用价值的分类是研究软件脆弱性的基础。分析了软件脆弱性的本质,说明了分类法的基本原理,并重点分析了各种典型的软件脆弱性分类法的不足,提出了一种新的多维的软件脆弱性分类法的设计思路。 相似文献
3.
4.
5.
6.
对结合纹理信息与光谱信息的遥感图像分类方法进行了研究。首先介绍了常规的遥感图像分类方法,监督分类法和非监督分类法,并结合ERDAS软件和试验数据进行分类实验;接着引出纹理信息的概念,并探讨其在遥感图像分类中的应用,提取原数据中的纹理信息参与分类;最后,比较分析分类的结果,论证了结构与光谱信息相结合的遥感图像分类方法可行性。 相似文献
7.
首先分析了已有的网络攻击分类法的不足;概要介绍新开发的基于教学培训和公安侦讯目的网络攻击平台及功能框架,介绍网络攻击平台的特点以及关键技术;网络攻击分类是攻击平台的关键,本文提出“维”度的攻击分类法,此分类法非常符合网络攻击平台的特点要求,以据此分类法对当前新出现的网络攻击进行分类,符合网络攻击分类原则,以建立网络攻击知识库为目标。 相似文献
8.
介绍了以单面判别平面、最优权重向量和权位判定逻辑为基本思想的分段线性分类方法(PLC)。在多时相数字视频数据实浏中,PLC的处理速度虽略低于平行六面休分类法(PPC),却远高于高斯最大似然分类法(GMLC);而PLC的分类精度不但与GMLC相近,且远高于PPC。实验表明,在遥感作物分类精度和运算速度方面,PLC是比GMLC或PPC更优的选择。 相似文献
9.
分析了传统ABC分类法在不常用备件库存分类中的应用,针对传统ABC分类法的缺陷.文章应用基于AHP的ABC分类方法,将备件单价、采购提前期、年采购费用、年使用次数、备件类型、重要性等级作为分类准则,对每一备件相对准则层进行ABC分类,然后结合准则层对目标层的权重计算备件组合权重并再次进行ABC分类,建立了不常用备件基于... 相似文献
10.
11.
《Information Security Journal: A Global Perspective》2013,22(1-3):54-67
ABSTRACTSecurity is an enduring priority for both individuals and communities. Methods such as locks, fences, identity cards, and passbooks have been used for many years to provide security against physical attack, crime, espionage, and terrorism. As a result, many national governments, standards organizations, think tanks, and commentators have proposed security methods. None of these methods provides enduring and effective responses to the serious security challenges faced today. Shortfalls in effectiveness derive from terminology that is inconsistent, incomplete, confusing, or contains language that is specific to the physical, personnel, or electronic domains.This article presents harmonized taxonomies for security and resilience that can be applied across the physical, personnel, and electronic domains. These taxonomies provide an ordered set of terms to organize thinking, and facilitate data and information sharing throughout the security discipline.Functional decomposition is used to derive the new taxonomies of security and resilience. Case studies that span the physical, personnel, and electronic security domains are used to provide the experimental context to test the utility of the new taxonomies, using an established security risk assessment framework. The utility of the new taxonomies is further validated by the results of a survey of senior security experts. 相似文献
12.
《Ergonomics》2012,55(8):1009-1018
Low-hours solo glider pilots have a high risk of accidents compared to more experienced pilots. Numerous taxonomies for causal accident analysis have been produced for powered aviation but none of these is suitable for gliding, so a new taxonomy was required. A human factors taxonomy specifically for glider operations was developed and used to analyse all UK gliding accidents from 2002 to 2006 for their overall causes as well as factors specific to low hours pilots. Fifty-nine categories of pilot-related accident causation emerged, which were formed into progressively larger categories until four overall human factors groups were arrived at: ‘judgement’; ‘handling’; ‘strategy’; ‘attention’. ‘Handling’ accounted for a significantly higher proportion of injuries than other categories. Inexperienced pilots had considerably more accidents in all categories except ‘strategy’. Approach control (path judgement, airbrake and speed handling) as well as landing flare misjudgement were chiefly responsible for the high accident rate in early solo glider pilots. 相似文献
13.
14.
现有的词语语义相似性计算主要包括基于向量模型以及基于词汇分类体系两类方法,但这两类方法都存在自身的缺点。向量模型所依赖的文本共现中的上下文信息不等同于真正意义上的语义,而词汇分类体系方法则存在构建代价大,并且在一定程度上还不够完善的问题。该文提出一种向量模型与多源词汇分类体系相结合的词语相似性计算方法,采用多源词汇分类体系的近义词关系以及向量模型得到的词向量,计算得到词语的向量表达,并探索了不同类型词汇分类体系提供的知识的选用和融合问题,弥补了单一词向量和单一词汇分类体系在词语相似性计算中的缺点。该文采用了NLPCC-ICCPOL 2016词语相似度评测比赛中的PKU 500数据集进行评测。在该数据集上,该文的方法取得了0.637的斯皮尔曼等级相关系数,比NLPCC-ICCPOL 2016词语相似度评测比赛第一名的方法的结果提高了23%。 相似文献
15.
16.
17.
软件脆弱性分析 总被引:3,自引:0,他引:3
Software vulnerability is the root reason that cause computer system security problem. It's a new researchtopic to analyze vulnerability based on the essence of software vulnerability. This paper analyzes the main definitions and taxonomies of vulnerability,studies vulnerability database and tools for vulnerability analysis and detection, and gives the details about what caused the most common vnlnerabilities in the LINUX/UNIX operating systems. 相似文献
18.
基于星型网模型的安全漏洞分类 总被引:4,自引:0,他引:4
在进行入侵检测技术的研究中,安全漏洞分类是一个重要和必需的过程。然而,现有的漏洞分类在不同程度上都存在一些弊端。为了使分类更加科学、有用,该文提出了一种基于星型网模型的安全漏洞分类。该分类利用星型网的特点,将所有漏洞构造成一个7维数据空间,每一维都有具体的粒度划分,可以利用多维数据模型上的数据挖掘对漏洞进行较全面的多维度的数据分析与知识发现。 相似文献
19.
JOHN W. SUTHERLAND 《国际通用系统杂志》2013,42(2):131-146
Beginning with the isolation of four essentially unique mathematical intervals on a continuum, we show the process by which an array of four phenomenological ideal-types can be generated which carry rather specific analytical and administrative implications. The basic vehicle of the paper is deductive inference, employed to generate successively more specific taxonomies of system types, eventuating in the four felt to be a specific interest as real-world references for the social scientist, with empirical point included wherever they can defend the deductions. 相似文献