首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
A variety of relief materials needs to be transported to the disaster hit areas immediately after natural disasters. This paper studies the problem of planning relief materials vehicles in order to maximize their total weight. We propose a new method named substitution equilibrium point which can be used to plan relief materials vehicles. One feature of our model is to consider the substitution among vehicles which is usually omitted in the literature. The simulation experiments show that the transportation fleets are increased effectively considering the substitution between vehicles. Substitution equilibrium point has the same results as integer programming but has much lower time complexity.   相似文献   

2.
关联基础设施网络在级联故障下的脆弱性研究   总被引:1,自引:0,他引:1  
为研究电力-天然气级联故障和系统间的关联性对基础设施脆弱性的影响,采用复杂网络理论与方法,以华中地区某城市电力-天然气网络为例分析了关联基础设施网络在级联故障下的脆弱性.通过对电力、天然气网络的功能特性以及网络之间的关联关系与接口设计标准进行建模,得到了网络的全局脆弱性和最优接口.同时利用网络的关键组件辨识方法,得到了网络的脆弱性指标,为控制基础设施系统的级联故障、增强系统的抗干扰能力提供了决策支持.  相似文献   

3.
4.
5.
文章通过分析比较关键信息基础设施保护对象与中国等级保护对象,研究国际基础设施关键性评价方法,反思中国等级保护定级理论和工作方法,提出了进一步改进等级保护定级工作对策和建议。  相似文献   

6.
关键基础设施网络连锁反应模型   总被引:3,自引:0,他引:3  
关键基础设施突发事件连锁反应复杂,或因级联效应造成系统整体崩溃,或因网络线路的重分配而被镇定。应用复杂网络理论,构建1种关键基础设施复杂网络的连锁反应动力学模型,考虑边负荷重分布条件,模拟分析关键基础设施网络连锁反应机制。应用模型对交通网络进行分析,得出蓄意攻击对网络的连通性影响最大,以及边承载能力对网络的连通性具有很大影响的结论,为关键基础设施可靠性评估和结构功能优化提供了思路和途径。  相似文献   

7.
对国家关键基础设施的建模仿真越来越受到各国重视.为应对危机影响下国家关键基础设施仿真的需求,寻求国家关键基础设施这一复杂系统的模型建立方法,界定了国家关键基础设施的基本概念、组成,分析了用建模与仿真方法研究该问题的必要性,根据"按需服务"的设计思想,设计了国家关键基础设施模型的总体结构,并对各子模型的实现和模型综合集成方法进行了深入研究和思考.该模型及设计思路为复杂社会系统的建模与仿真提供了有益的借鉴和参考.  相似文献   

8.
9.
10.
国家关键基础设施网络综合仿真模型设计   总被引:2,自引:1,他引:1  
为了能够评估各种军事和非军事行动对国家关键基础设施网络的影响.采用复杂网络和Agent建模方法构建国家基础设施网络综合仿真模型来分析对摹础设施的影响过程.采用多领域分层结构的方法来设计国家关键基础设施的综合仿真模型的总体框架结构,给出了国家关键基础设施仿真模型的逻辑结构,采用构建影响区人工势场的方法来设计基础物理和空间关联关系模趔,采用全球三维地理信息系统GeoMatrix设计三维可视化系统,基于COM+和数据库设计了系统模型的分布式总体集成策略.  相似文献   

11.
12.
近年来,随着关键基础设施控制系统的标准化、智能化、网络化发展,针对关键基础设施的网络攻击日益增多.电力、石化、轨道交通等涉及国计民生的关键基础设施一旦被攻击,很可能造成灾难性后果.关键基础设施信息安全成为悬在各国政府头上的达摩克利斯之剑,采取措施加强其信息安全保障能力势在必行.本文首先介绍了关键基础设施的基本概念以及关键基础设施中应用的典型工业控制系统,分析了关键基础设施信息安全事件的特点,阐述了工业控制系统面临的信息安全挑战,并针对这些挑战提出了相应的措施建议.  相似文献   

13.
关键信息基础设施(CII)是经济社会运行的神经中枢与网络安全的重要保障,但也面临着复杂多变的网络攻击和威胁。基于人工智能的网络安全防护,能够为CII防御构建灵敏的异常识别机制、自动化的事件分析引擎和精确的全局运维能力。分析CII的攻击风险,研究已有安全防护体系的形态结构,并基于SMCRC环思想构建智能CII安全体系。针对人工智能驱动的态势感知、持续监控等CII防御要点以及信任机制、威胁情报等CII防御保障的发展趋势进行综述和分析。  相似文献   

14.
Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these objectives in the cost effective manner at existing CIS and also in the future. A control systems engineering approach to integrated monitoring, control and security of critical infrastructure systems (CIS) is applied. A multilayer structure for an intelligent autonomous reconfigurable agent operating within a single region of a CIS is derived first. Methods and algorithms for synthesising the layers are proposed so that the agent can autonomously perform required control activities under wide range of operating conditions. The required ability of the system to meet the desired operational objectives under a wide range of the operating conditions is achieved by supervised reconfiguration of the agents. Recently proposed robustly feasible model predictive control technology with soft switching mechanisms between different control strategies is applied to implement the soft and robustly feasible agent reconfiguration, which is adequate to current operational conditions. Next developing the multiagent structures, which are suitable for monitoring, control and security of an overall CIS is discussed. It is based on the distributed structuring the agent layers. The proposals are illustrated by applications to the integrated wastewater treatment case-study system and drinking water distribution system.  相似文献   

15.
The need to protect US critical infrastructures has been the primary motivation behind two of the US Federal Government’s security education initiatives: the National Security Agency’s Centers of Academic Excellence in Information Assurance Education (CAE/IAE) programme, and the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) programme. This article assesses the strength of these education programmes with respect to improving the level of critical infrastructure security.  相似文献   

16.
This special issue of IEEE Security & Privacy focuses on the security, agility, and robustness of large-scale critical infrastructure. Specifically, it examines the challenges associated with infrastructure protection for enhanced system security, reliability, efficiency, and quality.  相似文献   

17.
Adaptation of the operations research models and methods to planning of the critical infrastructure protection is considered. Adaptation of these models includes taking into account stochastic, informational, and behavioral uncertainty of terrorists. In particular, relevant generalizations of the antagonistic attack–defense game and optimal allocation of protective resources are considered, and methods are proposed to solve the occurring optimization problems.  相似文献   

18.
The events of 11 September 2001 brought an increased focus on security in the United States and specifically the protection of critical infrastructure. Critical infrastructure encompasses a wide array of physical assets such as the electric power grid, telecommunications, oil and gas pipelines, transportation networks and computer data networks. This paper will focus on computer data networks and the spatial implications of their susceptibility to targeted attacks. Utilising a database of national data carriers, simulations will be run to determine the repercussions of targeted attacks and what the relative merits of different methods of identifying critical nodes are. This analysis will include comparison of current methods employed in vulnerability analysis with spatially constructed methods incorporating regional and distance variables. In addition to vulnerability analysis a method will be proposed to analyse the fusion of physical and logical networks, and will discuss what new avenues this approach reveals. The analysis concludes that spatial information networks are vulnerable to targeted attacks and algorithms based on distance metrics do a better job of identifying critical nodes than classic accessibility indexes. The results of the analysis are placed in the context of public policy posing the question do private infrastructure owners have sufficient incentives to remedy vulnerabilities in critical networks.  相似文献   

19.
等级保护与关键基础设施防护的融合研究   总被引:3,自引:0,他引:3  
文章通过对信息安全等级保护工作思路和关键基础设施防护思路对比分析,认为二者在最终防护目的上基本是一致的,都要求重点保护对于机构或国家来讲都是非常重要的信息系统.在此基础上,文章分析了二者在各个环节可能的融合点,包括系统定级、分级保护、系统保障、部门合作以及法律问题等.通过分析二者的相似点和不同点,文章认为等级保护工作可以充分吸收关键基础设施防护的精髓,不断完善,从而使等级保护工作达到全面地保护信息系统的目的.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号