共查询到2条相似文献,搜索用时 0 毫秒
1.
Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction. The system meets the demands of analysis and prediction for large-scale network security situation. 相似文献
2.
In this paper, we have proposed a differential game model to optimally solve the
resource allocation problems in the edge-computing based wireless networks. In the
proposed model, a wireless network with one cloud-computing center (CC) and lots of edge
services providers (ESPs) is investigated. In order to provide users with higher services
quality, the ESPs in the proposed wireless network should lease the computing resources
from the CC and the CC can allocate its idle cloud computing resource to the ESPs. We
will try to optimally allocate the edge computing resources between the ESPs and CC using
the differential game and feedback control. Based on the proposed model, the ESPs can
choose the amount of computing resources from the CC using feedback control, which is
affected by the unit price of computing resources controlled by the CC. In the simulation
part, the optimal allocated resources for users’ services are obtained based on the Nash
equilibrium of the proposed differential game. The effectiveness and correctness of the
proposed scheme is also verified through the numerical simulations and results. 相似文献