共查询到20条相似文献,搜索用时 143 毫秒
1.
人工智能技术在不断发展的同时,其在各行业中的使用也越来越广泛。但是人工智能技术在为人们的生产生活带来便利的同时,也引入了新的安全风险。为了应对潜在的安全隐患,做到事前预防,保障人工智能的安全,提出了一种基于信息熵和马尔可夫链的人工智能全生命周期安全风险评估方法。一方面,该方法能够在对人工智能进行整体性的安全风险等级评估的同时,保留对各类安全风险的评估;另一方面,基于马尔可夫链形成各个风险类在稳定状态下的转移矩阵和概率分布,提供了一种面向全局的人工智能安全风险的展现方法。 相似文献
2.
文中结合信息系统存在的信息数据丢失、泄露等安全风险,应用模糊算法,提出了一种信息系统安全风险评估方法。首先,根据信息安全风险评估定义和风险度量方法,构建了信息系统安全风险分析模型和评估模型。其次,应用模糊算法,创建了基本概念赋值函数,并确定了基础指标与评估指标对应的模糊关系,确定了基本概率赋值函数。最后,以“电力信息系统风险评估”为例,验证该方法的有效性和可靠性。验证结果表明,该方法操作简单、有效、可行,不仅可以精确控制信息系统安全风险,还能提高信息系统的安全防御能力。 相似文献
3.
随着信息化建设步伐的加快,信息安全面临的风险日益增加。为了对信息安全风险进行评估,提出一种基于模糊综合评判和AHP的信息系统安全风险评估方法,分析了系统面临的风险威胁,建立了评估指标体系,通过AHP确定指标权重,对某单位局域网信息系统安全进行了风险评估,确定了风险等级,指出了风险来源,结果表明,该方法能较好地量化评估信息系统安全风险。 相似文献
4.
在数字经济时代,5G技术在为国家社会经济发展带来便捷的同时,也引发了新的安全挑战和风险。其中,5G网络风险防范成为各国政府、国际标准组织、电信运营和设备制造企业高度关注的焦点。文章系统回顾国际5G网络安全建设工作,对运营商5G安全防护现状和不足进行分析,并针对5G网络面临安全挑战,结合实践案例提出内生安全助力打造5G坚强网络的解决方案。 相似文献
5.
本文应用层次分析法研究信息系统的安全风险量化评估问题。首先,基于信息系统安全风险的复杂诱因,提出了一套切合实际的风险相关要素,并对风险要素进行分类与组合,拓展了AHP方法的层次递阶模型。然后构建了信息系统的安全风险量化评估判断矩阵集。最后进行了层次单排序权向量、层次总排序权向量及其一致性检验分析。研究结果表明该方法对信息系统安全风险的量化评估有重要实践价值。 相似文献
6.
张辉 《电视字幕·特技与动画》2023,(2):73-76
本文介绍了基于Matlab GUI智能播控值班管理系统的设计,阐述了其在重要保障期的应用案例,系统还在大屏综合信息区实现了值班信息可视化联动。该系统用户界面友好,操作简洁,具备完善的规则决策,为安全播出减少了交接班风险的同时降低了管理成本。 相似文献
7.
8.
9.
信息安全风险评估是保障信息系统安全的重要手段之一,也是信息系统安全体系建设的前提和基础。文中在分析信息安全风险评估要素和评估过程的基础上,结合实际经验针对定量风险评估讨论了定量风险评估要素的量化规则、量化方法和风险计算方法,该方法在定量风险评估过程中具有科学性、合理性和实用性特点。 相似文献
10.
电力行业是关系到国计民生的基础性行业。为防范电力信息系统风险,提出了一种基于概率模型的多因素风险量化方法。通过全面考虑资产、威胁、脆弱性、已有的安全防护措施等因素的内在关系,能够更准确评估安全风险;通过概率模型将资产风险量化为整体系统的风险,能够更准确地体现风险的含义。实际运行结果表明,该方法能够有效评估电力系统信息安全工作水平。 相似文献
11.
Kuei-Hu Chang 《Microelectronics Reliability》2009,49(12):1586-5547
Risk assessment is a preventive analysis task of product design and the production planning process. The purpose is to assign limited resources to the most serious risk items and ensure that the product can achieve its designed functions under specific operating conditions. Most current failure mode and effects analysis (FMEA) methods use the risk priority number (RPN) value to evaluate the risk of failure. However, conventional RPN methodology has not considered the situation parameter and the relationship between components of a system with respect to its type (direct/indirect) and severity. Therefore, a more general and efficient algorithm to evaluate the risk of failure is needed. This paper proposes a more general RPN methodology, which combines the ordered weighted geometric averaging (OWGA) operator and the decision-making trial and evaluation laboratory (DEMATEL) approach for prioritization of failures in a product FMEA. A case of a thin film transistor liquid crystal display (TFT-LCD) product that has been drawn from a professional liquid crystal display manufacturer is presented to further illustrate the proposed approach. The result of the proposed method is compared with the listing approaches of risk assessment methods. 相似文献
12.
This paper describes an investigation of an optimization-with-constraints method, which uses a hypothetically acceptable level of risk as a constraint, for use in design of liquid metal fast breeder reactor (LMFBR) nuclear power generating stations. No attempt was made during the investigation to define the level of the acceptable risk. Major problems inherent in development of an optimization-with-constraints approach to risk-based design are discussed. Further development of the approach should be along two lines (both of which would require a computer program capable of handling about 50 decision variables): 1. develop a tool for use by product engineers in plant conceptual design; 2. develop a combined risk allocation/optimization-with-constraints methodology. 相似文献
13.
Parameter selection for health monitoring of electronic products 总被引:3,自引:0,他引:3
This paper presents an approach for selecting precursor parameters for health monitoring of electronic products. The approach includes failure modes, mechanisms, and effects analysis (FMMEA) and life cycle profile analysis of a product. The criticality of the failure mechanisms is established using a risk priority number (RPN), where the RPN for each failure mechanism is calculated as a product of the occurrence and the severity of each mechanism. Performance parameters that can be associated with the critical failure mechanisms should be selected for health monitoring of the product. These parameters could be used for diagnostic purposes. A case study is presented to demonstrate the parameter selection approach for a computer server system. FMMEA was performed on the server, and precursor parameters of the server were selected for monitoring based on the failure modes and mechanisms that posed the highest risk. The utilization of identified parameters for fault detection is presented through a diagnostic algorithm. This approach can be used to select parameters for health monitoring of any system. 相似文献
14.
基于扩展粗糙集理论的信用风险分析 总被引:1,自引:1,他引:0
在对传统信用风险等级评价模型总结的基础上,提出了一种基于扩展粗糙集理论的评价方法.该方法首先将信用风险等级评价抽象成一个多准则分类问题,然后使用DRSA法直接从历史数据中提取决策规则,所得到的规则不仅可以用于企业的信用等级评价,还可以反映各指标与信用等级之间的关系.通过一组上市公司的实际数据验证了该方法的有效性. 相似文献
15.
16.
1 Attack Modeling A typical attack contains the following elements: 1) Objects attacked. These objects belong to the victims or can be regarded as public resource, such as networking bandwidth. 2) Attacker. These objects contain the hacker’s information, attacking tools and other states of attacker. 3) Attack processes. The stages of an attack and attack processes are used to depict the attacking action. 4) Control actions. These actions can be classified into response actions and defensiv… 相似文献
17.
This paper presents a new decision analysis approach for modeling decision problems with continuous decision and/or random variables, and applies the approach to a research and development (R&D) planning problem. The approach allows for compact, natural formulation for classes of decision problems that are less appropriately addressed with standard discrete-variable decision analysis methods. Thus it provides a useful alternative analysis approach for problems that are often addressed in practice using simulation risk analysis methods. An illustrative application is presented to energy system R&D planning. The continuous-variable version of this model more directly represents the structure of the decision than a discrete approximation, and the resulting model can be efficiently solved using standard nonlinear optimization methods 相似文献
18.
19.
Event-tree analysis using binary decision diagrams 总被引:2,自引:0,他引:2
This paper is concerned with ETA (event-tree analysis) where the branch point event causes are defined using fault trees. Attention is on the nontrivial situation where there are dependencies amongst the branch point events. The dependencies are due to component-failures in more than one of the fault trees. In these situations the analysis methods based on traditional FTA (fault-tree analysis) are inaccurate and inefficient. The inaccuracies are not consistent across the outcome events. If frequency predictions calculated in this way are then used in a risk assessment then the relative risks would be distorted and could lead to resources being used inappropriately to reduce the overall risk. A new approach using BDD (binary decision diagram) is described which addresses these deficiencies 相似文献
20.
《IEEE transactions on information technology in biomedicine》2008,12(5):644-649