首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
巩天宇  尚文利  侯静  陈春雨  曾鹏 《计算机应用研究》2020,37(8):2409-2412,2416
为了提高脆弱性量化评估结果的可靠性,提出一种基于模糊攻防树和熵权法的工控系统脆弱性量化评估方法。该方法以攻击防御树为模型,首先将模糊集合理论与专家评价相结合,然后聚合多位专家对同一安全属模糊评价,在模糊聚合过程中利用模糊距离计算专家模糊评价的偏离度以提高模糊聚合的可靠性,并采用熵权法确定叶子节点量化过程中各安全属性的权重。最后计算叶子节点及攻击序列概率。案例分析表明,该方法能有效提高评估结果的可靠性,为工控系统信息安全防护提供重要依据。  相似文献   

2.
为了识别J2EE架构设计中潜在风险以及评估J2EE安全机制的实施程度,提出了一种基于组件安全属性的J2EE架构安全性评估方法。该方法关注于架构安全机制的实施力度,将架构的安全性细化到组件层,并使用安全属性树描述组件的安全机制,从而进行评估。在评估时,首先依据J2EE层次和组件功能对组件进行分类,然后采用层次分析法和模糊评价法计算组件安全性评估要素,最后综合组件安全性要素得出J2EE设计的安全性结论。实验表明该方法提高了评估效率,使得J2EE架构安全性评估过程更具客观性和精确性。  相似文献   

3.
PSR模型支持下重庆市主城区生态安全评价   总被引:1,自引:0,他引:1  
运用PSR(压力-状态-响应)模型构建重庆市主城区生态安全评价指标体系,并结合层次分析法和熵权法确定指标权重,对重庆市主城区1988~2007年近20年的生态安全情况进行评价分析,最后利用ArcGIS9.3对主城区1988、2000、2007年的生态安全指数进行可视化,动态分析主城区近20年来生态安全情况的空间差异性。结果表明:重庆市主城区过去20年间整体生态情况趋好,近年来各区环境整体上都有较大好转。分析其驱动因素,主要概括为:政府加大环保投入,人口素质提高,环保法律法规的健全等方面。  相似文献   

4.
Although investment projects supported by the state are extremely important in terms of national policy the projects to be transferred from the common public funds brings with it many problems. Highly transparent and comprehensive evaluation model are required to transfer the public resources to the right investment projects. It is necessary to consider many criteria for the evaluation of an investment project. These criteria are generally subjective and extremely difficult to express in numbers. However, using the fuzzy sets provide huge facilities to decision makers in project evaluation process with linguistic variables and measurement challenges. In this study, a new evaluation model for investment projects have been proposed for development agencies operating in Turkey. To address ambiguities and relativities in real world scenarios more conveniently, type-2 fuzzy sets and crisp sets have been simultaneously used. The proposed model for the investment project evaluation problem composed of type-2 fuzzy AHP and type-2 fuzzy TOPSIS methods. The proposed fuzzy MCDM method consists of three phases: (1) identify the criteria to be used in the model, (2) type-2 fuzzy AHP computations, (3) evaluation of investment projects with type-2 fuzzy TOPSIS and determination of the final rank. To perceive proposed model better, an application with real case data have been performed in Middle Black Sea Development Agency in Turkey. As a consequence of this application, it has been observed that the proposed model have proved effective in evaluation of alternatives in multi-criteria group decision making problems in a broader perspective and flexible fashion.  相似文献   

5.
针对传统导弹并行测试系统安全性评价主观因素突出的缺点,提出基于神经网络的导弹并行测试系统安全性模糊综合评估模型.首先建立了导弹并行测试系统安全性评价的指标体系,其次介绍了基于IA- BP神经网络的模糊综合评价模型,并详细介绍了模型应用的方法和步骤,最后通过实例分析,得出结论.结果表明基于IA- BP神经网络的模糊综合评价方法具有运算速度快、通用性强的特点,利用该方法对导弹并行测试系统的安全性进行评价具有可行性和客观有效性.  相似文献   

6.
针对信息安全评估的模糊性,考虑之前算法的单一方面模糊问题,分析信息安全系统不同时间段内的表现,提出一种基于改进DS理论的双重模糊信息安全评估算法。不仅利用三角模糊数方法把专家观点进行聚合,还用改进的DS理论充分体现出不同时间段内系统的表现会造成的对专家评价结果的影响,根据风险计算公式,最终得到威胁严重程度排序。与单一决策算法相比,综合考虑了信息安全系统的不确定性和主观人为的不确定性,避免了单一时间段内的笼统决定,通过实验,验证了该方法的必需性及有效性。  相似文献   

7.
当前数据采集与监控系统(supervisory control and data acquisition, SCADA)系统面临着巨大的安全威胁,对其风险状况进行监测和评估是一项有效的应对措施。为有效处理评估过程中存在的模糊性和随机性问题,将云模型理论引入SCADA系统安全风险评估中,提出了一种基于云模型和组合权重的安全风险评估模型。该模型从SCADA系统的资产、威胁、脆弱性、安全措施4方面构建安全风险评估指标体系,采用最小二乘法求出评估指标的最优组合权重,借助云发生器得到评估指标的云模型数字特征和SCADA系统的综合评估云,然后基于黄金分割率构建标准评估云,同时结合改进的云相似度计算方法得出最终评估结果,最后通过实验验证了模型的有效性和可行性。研究结果表明,该模型能够得到准确的评估结果,与模糊综合评价等方法相比,该评估方法具备更高的可信性,评价效果更好。该方法不仅有助识别SCADA系统的安全风险威胁,而且为其他领域的安全风险评估提供了一定的参考。  相似文献   

8.
基于模糊评价方法的网络安全评价研究   总被引:2,自引:0,他引:2  
针对网络安全性评价研究中的度量问题建立了基于ISO/IEC9126标准的网络安全指标体系模型.结合网络安全评价方法研究中的模糊性和不确定性等常见问题,首先以度量数据和各项指标计算公式为基础计算其指标值.其次,运用指标体系模型和模糊评价方法对评价指标进行模糊化处理.最后,结合各指标评价质量和模糊综合评价方法评价网络安全性.通过建立网络安全性评价模型,有效地解决了网络安全性的多指标评价问题,可用于指导相关人员进行网络安全方面改进.  相似文献   

9.
针对信息系统安全评价现有方法中各评价指标由研究者主观提出的实际情况,提出了一种新的综合层次分析法并结合德尔菲法的A-Delphi方法构建分层结构评价体系,运用该评价体系建立了一个适用于信息系统安全评价的通用数学模型。最后利用模糊综合评价法在该模型基础上对一个实际信息系统进行了安全等级评估。  相似文献   

10.
Hybrid artificial intelligence approach to urban planning   总被引:1,自引:0,他引:1  
Knowledge-based modeling and implementation of the various urban planning processes represent an intensive research area. This paper presents a hybrid artificial intelligence system using a knowledge-based approach, neural networks and fuzzy logic that automates the decision-making process in urban planning. The system is used for developing urban development alternatives based on real-world data. Results show that, by integrating knowledge-based systems, artificial neural networks and fuzzy systems, the system achieves improvements in the implementation of each respective system as well as an increase in the breadth of functionality within the application. With this approach, the best of three technologies can be compiled together to solve complex urban problems. We discuss the structure of the combined technologies, as well as providing examples of its application in the field of urban development.  相似文献   

11.
为了提高云信息存储的安全性,需要进行信息加密设计,提出基于融合模糊聚类算法的云信息存储加密算法。在同态公钥加密体系下构建云信息存储加密的数据分布式结构模型,提取云存储信息加密统计特征量,采用同态数据融合方法进行云信息的模糊聚类处理,结合模糊C均值聚类方法进行云信息的分段融合调度;在分段区间内采用随机线性编码方案进行云信息存储加密的编码设计,基于融合模糊聚类算法构建加密密钥,实现云信息存储加密优化设计。仿真结果表明,采用该方法进行云信息存储加密的信息融合性较好,抗破译能力较强,提高了云存储数据的安全性。  相似文献   

12.
对2011年全国大学生数学建模A题中的数据进行了分析,运用模糊综合评判法评价了城市土壤重金属污染程度,给相关研究提供思路和借鉴。  相似文献   

13.
为了更好地评定IP返回跟踪DoS攻击方案的优劣,提出了一种将层次分析法(AHP)和模糊综合评价法结合起来评估IP返回跟踪DoS攻击方案的方法。该方法使用AHP确定评价体系中各指标的权重,使用模糊综合评价法对各方案进行综合评定,得到各方案的最终评定值,从而对6种IP返回跟踪DoS攻击方案做比较分析,可以为网络安全决策提供支持。  相似文献   

14.
基于评估流程的信息安全风险的综合评估   总被引:1,自引:0,他引:1       下载免费PDF全文
对信息安全风险评估提出了一种新的评估方式。根据风险评估流程,采用模糊综合评判法和AHP方法相结合的方法,对信息系统安全风险进行综合评估。采用模糊综合评判的方法,对资产、威胁、脆弱性进行评估,判断资产的风险等级,求出资产风险值,对系统风险进行定量评定。在评估资产时,对资产的安全特性:机密性、完整性、可用性,采用AHP的方法,构造比较判断矩阵,求出各因素的权重。通过实例验证,该方法操作方便,评估结果准确,具有一定的实际意义。  相似文献   

15.
介绍了某聚酯生产过程酯化工艺建立的过程质量指标酯化率的软测量模型。提出一种利用减法聚类产生初始的T-S模糊模型,通过粗调与细调聚类半径优化模糊模型的方法。建模前选择或计算出辅助变量,对样本数据进行了误差剔除与归一化处理。仿真结果表明,该方法建模速度快,模型泛化性能良好,为酯化率的估计提供了一种有效方法。  相似文献   

16.
The linguistic dynamic systems(LDSs) based on type-1 fuzzy sets can provide a powerful tool for modeling, analysis,evaluation and control of complex systems. However, as pointed out in earlier studies, it is much more reasonable to take type-2fuzzy sets to model the existing uncertainties of linguistic words. In this paper, the LDS based on type-2 fuzzy sets is studied, and its reasoning process is realized through the perceptual reasoning method. The properties of the perceptual reasoning method based LDS(PR-LDS) are explored. These properties demonstrated that the output of PR-LDS is intuitive and the computation complexity can be reduced when the consequent type-2 fuzzy numbers in the rule base satisfy some conditions. Further, a data driven method for the design of the PR-LDS is provided. At last, the effectiveness and rationality of the proposed data-driven method are verified by an example.  相似文献   

17.
单美静 《计算机科学》2015,42(Z11):368-371
大数据时代影响移动支付发展的重要因素就是安全。总结了移动支付相对于互联网支付而存在的个性和疑难安全问题,通过德尔菲法构建了安全评估指标结构。运用层次分析法计算各指标的权重,在设计的指标体系中找出风险节点,最终得到整个系统的安全值。该方法将层次分析法引入移动支付指标系统信息安全度计算。实验表明,该评估指标结构以及安全度计算能为移动支付提供有效的安全量化评估。  相似文献   

18.
In this paper, fuzzy modeling for the control of basic oxygen furnace (BOF) processes is proposed. BOF is a widely preferred and effective steel making method due to its higher productivity and considerably low production cost. Therefore, today almost 65% of the total crude steel production in the world is met by using the BOF method. Higher steel output at lower cost is one of the main objectives of modern steel making methods. In order to accomplish this objective, fuzzy modeling was employed in this study in order to control some variables related to the BOF process. Fuzzy modeling and control in BOF promise a solution to the strongly non-linear problems associated with the process, which have so far proven extremely difficult to be solved by conventional control methods. Data set was selected as inputs from the real empirical BOF data in an integrated steel plant based in Turkey. Although there were negligible deviations from the target values, most of the fuzzy results obtained using MATLAB-Fuzzy Logic Toolbox version 5.0 were found to be acceptable. As a result of the application of the proposed modeling, acceptable levels of compatibility were achieved compared to the empirical BOF data and targeted steel composition. The paper indicates how fuzzy logic would be effectively used for improved process control of BOF furnace in steel making industry.  相似文献   

19.
政府开放数据作为国家和社会发展重要战略资源,蕴含着巨大价值,但我国在政府开放数据的安全风险评估方面缺乏标准,国家数据安全面临风险。借鉴信息安全风险评估理论,以国家安全资产、开放数据脆弱性和安全威胁作为主要安全风险要素,构建政府开放数据的安全风险评估模型,利用层次分析法和模糊综合评价法对政府开放数据的安全风险进行量化评估,并通过实例验证模型的有效性。  相似文献   

20.
Starting with the birth of Web 2.0, the quantity of data managed by large-scale web services has grown exponentially, posing new challenges and infrastructure requirements. This has led to new programming paradigms and architectural choices, such as map-reduce and NoSQL databases, which constitute two of the main peculiarities of the specialized massively distributed systems referred to as Big Data architectures. The underlying computer infrastructures usually face complexity requirements, resulting from the need for efficiency and speed in computing over huge evolving data sets. This is achieved by taking advantage from the features of new technologies, such as the automatic scaling and replica provisioning of Cloud environments. Although performances are a key issue for the considered applications, few performance evaluation results are currently available in this field. In this work we focus on investigating how a Big Data application designer can evaluate the performances of applications exploiting the Apache Hive query language for NoSQL databases, built over a Apache Hadoop map-reduce infrastructure.This paper presents a dedicated modeling language and an application, showing first how it is possible to ease the modeling process and second how the semantic gap between modeling logic and the domain can be reduced, by means of vertical multiformalism modeling.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号