首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Due to the large volume of data related to vessels, to manually pore through and to analyze the information in a bid to identify potential maritime threat is tedious, if at all possible. This study aims to enhance maritime situational awareness through the use of computational intelligence techniques in detecting anomalies. A knowledge discovery system based on genetic algorithm termed as GeMASS was proposed and investigated in this research. In the development of GeMASS, a machine learning approach was applied to discover knowledge that is applicable in characterizing maritime security threats. Such knowledge is often implicit in datasets and difficult to discover by human analysts. As the knowledge relevant to maritime security may vary from time to time, GeMASS was specified to learn from streaming data and to generate up-to-date knowledge in a dynamic fashion. Based on the knowledge discovered, the system functions to screen vessels for anomalies in real-time. Traditionally in maritime security studies, datasets that are applied as knowledge sources are related to vessels’ geographical and movement information. This study investigated a novel leverage of multiple data sources, including Automatic Identification System, classification societies, and port management and security systems for the enhancement of maritime security. A prototype of GeMASS was developed and employed as a vehicle to study and demonstrate the functions of the proposed methodology.  相似文献   

2.
随着科学技术的发展,网络规模在不断的扩大,复杂性也在逐渐的增强,面临的网络安全问题也越来越严峻。传统的网络安全技术已经无法满足网络快速发展的需要,无法全面的防御网络攻击行为,必须对新的网络安全技术进行大力研究和开发。网络安全态势感知能够对影响网络安全的因素进行量化分析,为保障网络安全提供重要的依据,因此,对网络安全态势感知进行研究意义重大。本文将在网络安全态势感知概念模型的基础上,对网络安全态势感知的相关研究进行探讨。  相似文献   

3.
探讨了一种基于网络态势感知的多源异构日志传感器的设计.给出了网络结构图和日志传感器的框架图,阐述了传感器设计的难点,相关的关键技术和设计方案.实验证明:该方案在数据采集和分析方面性能有显著的提高.  相似文献   

4.
Video surveillance activity has dramatically increased over the past few years. Earlier work dealt mostly with single stationary cameras, but the recent trend is toward active multicamera systems. Such systems offer several advantages over single camera systems - multiple overlapping views for obtaining 3D information and handling occlusions, multiple nonoverlapping cameras for covering wide areas, and active pan-tilt-zoom (PTZ) cameras for observing object details. To address these issues, we have developed a multicamera video surveillance approach, called distributed interactive video array. The DIVA framework provides multiple levels of semantically meaningful information ("situational" awareness) to match the needs of multiple remote observers. We have designed DIVA-based systems that can track and identify vehicles and people, monitor perimeters and bridges, and analyze activities. A new video surveillance approach employing a large-scale cluster of video sensors demonstrates the promise of multicamera arrays for homeland security.  相似文献   

5.
随着网络技术的发展,互联网技术得到突飞猛进的发展,但是在高速发展的背后,给很多网络黑客可乘之机,网络入侵行为逐渐泛滥化,给网络安全带来巨大的挑战.传统的网络维护技术早已不能满足当前技术水平.网络安全态势感知是一门应对网络入侵的新技术,给网络监管人员提供维护网络安全的途径,对当前信息技术的发展有重要的意义.本文将以网络安全态势感知模型的设计为基础,对其提供合理化的建议,以达到维护网络安全的作用.  相似文献   

6.
网络安全态势感知主要是站在整体大局的立场上去动态反映信息网络的安全环境,并从根本上对信息网络安全的发展趋势做出了评估和分析.作为网络安全领域的新热点,网络安全态势感知在学术的研究中取得了广泛的进展,但在系统构建和应用方面发展还不够迅速.在此背景下,提出了一种基于知识发现的网络安全态势建模和生成框架,通过一系列的实验过程以及结果分析,表明了该系统能够支持网络安全态势感知的不断发展.  相似文献   

7.
8.
Multimedia Tools and Applications - The current proliferation of large amounts of multimedia data creates an unprecedented challenge for security analysts in the context of Cyber Situational...  相似文献   

9.
作为继互联网、移动互联网之后的第三张网,工业互联网开放、互联、跨域的特点,打破了以往相对明晰的责任边界,带来了更加多元、复杂的信息安全挑战。文章分析了工业互联网在设备安全、控制安全、网络安全、平台安全、数据安全等方面的风险,阐述了态势感知的概念,并从技术角度阐述了在线监测、蜜罐仿真、网络流量分析、企业侧探针、平台安全监测五大工业互联网安全态势感知核心技术。  相似文献   

10.
随着网络环境的动态化、多样化、快速化,传统的网络安全防御体系难以应对复杂的安全形势,网络安全态势感知系统因具有全局感知、评估和预测的能力,在研究和应用上备受关注。但是目前存在有感知无行动、无法识别新型攻击、无法先发制人等缺点,为此提出一种响应式网络安全态势感知平台架构,在传统网络安全态势感知的基础上与统一数据管理和决策支持相结合,解决感知和行动一体化建设的问题,同时提出一种基于生成对抗网络技术的预测方法,根据潜在、有限的攻击行为,提前发掘完整攻击链,提前预判新型的网络安全攻击,做到先发制人,并进行了实证分析。  相似文献   

11.
《Ergonomics》2012,55(6):824-836
Abstract

The pickup of visual information is critical for controlling movement and maintaining situational awareness in dangerous situations. Altered coordination while wearing protective equipment may impact the likelihood of injury or death. This investigation examined the consequences of load magnitude and distribution on situational awareness, segmental coordination and head gaze in several protective equipment ensembles. Twelve soldiers stepped down onto force plates and were instructed to quickly and accurately identify visual information while establishing marksmanship posture in protective equipment. Time to discriminate visual information was extended when additional pack and helmet loads were added, with the small increase in helmet load having the largest effect. Greater head-leading and in-phase trunk–head coordination were found with lighter pack loads, while trunk-leading coordination increased and head gaze dynamics were more disrupted in heavier pack loads. Additional armour load in the vest had no consequences for Time to discriminate, coordination or head dynamics. This suggests that the addition of head borne load be carefully considered when integrating new technology and that up-armouring does not necessarily have negative consequences for marksmanship performance.

Practitioner Summary: Understanding the trade-space between protection and reductions in task performance continue to challenge those developing personal protective equipment. These methods provide an approach that can help optimise equipment design and loading techniques by quantifying changes in task performance and the emergent coordination dynamics that underlie that performance.  相似文献   

12.
Modern developments in the use of information technology within command and control allow unprecedented scope for flexibility in the way teams deal with tasks. These developments, together with the increased recognition of the importance of knowledge management within teams present difficulties for the analyst in terms of evaluating the impacts of changes to task composition or team membership. In this paper an approach to this problem is presented that represents team behaviour in terms of three linked networks (representing task, social network structure and knowledge) within the integrative WESTT software tool. In addition, by automating analyses of workload and error based on the same data that generate the networks, WESTT allows the user to engage in the process of rapid and iterative “analytical prototyping”. For purposes of illustration an example of the use of this technique with regard to a simple tactical vignette is presented.  相似文献   

13.
14.
The business capabilities of modern enterprises crucially rely on the enterprises’ information systems and underlying IT infrastructure. Hence, optimization of the business-IT alignment is a key objective of Enterprise Architecture Management (EAM). To achieve this objective, EAM creates, maintains and analyzes a model of the current state of the Enterprise Architecture. This model covers different concepts reflecting both the business and the IT perspective and has to be constantly maintained in response to ongoing transformations of the enterprise. In practice, EA models grow large and are difficult to maintain, since many stakeholders from various backgrounds have to contribute architecture-relevant information. EAM literature and two practitioner surveys conducted by the authors indicate that EA model maintenance, in particular the manual documentation activities, poses one of the biggest challenges to EAM in practice. Current research approaches target the automation of the EA documentation based on specific data sources. These approaches, as our systematic literature review showed, do not consider enterprise specificity of the documentation context or the variability of the data sources from organization to organization. The approach presented in this article specifically accounts for these factors and presents a situational method for EA documentation. It builds on four process-supported documentation techniques which can be selected, composed and applied to design an organization-specific documentation process. The techniques build on a meta-model for EA documentation, which is implemented in an EA-repository prototype that supports the configuration and execution of the documentation techniques. We applied our documentation method assembly process at a German insurance company and report the findings from this case study in particular regarding practical applicability and usability of our approach.  相似文献   

15.
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related technologies. Training can indeed play a big role in this regard, and consequently, assist by altering the insecure behaviour of many people. The objective of this article is to ascertain whether simulating phishing attacks together with embedded training can contribute towards cultivating users’ resistance towards ‘phishing attacks’. In order to achieve this objective, a phishing exercise at an institution in South Africa was conducted.  相似文献   

16.
Macromedia公司推出的Dreamweaver、Flash、Fire-works被称为“网页制作三剑客”,这一说法,既点明了它们的功能和用处,也形象地说明,如果能够将它们配合使用,将会发挥出更大的作用。我们将会在今后的教学中,逐一为大家讲解关于Dreamweaver和Flash的用法和技巧,这次首先来看看三剑客中不大为人所注意的Fireworks。 Fireworks主要用做图像的制作及处理,并以其简单  相似文献   

17.
Techniques for visualizing several climate variables, particularly clouds and wind velocities, are discussed. The techniques are volume rendering, textured contour surfaces, and vector field rendering. The application of these techniques is discussed in the context of a high-definition television (HDTV) animation produced to show global cloud motion during ten simulated days in January. The computational grid is defined by nearly a million grid points-320 evenly spaced longitudes, 160 unevenly spaced latitudes, and 19 unevenly spaced surfaces of constant geopotential. The climate variables at every grid point were output at every hour of simulated time, resulting in 380 MB of data per simulated day  相似文献   

18.
19.
This paper presents a systematic literature review to gain insight into the growing area of awareness maintenance. A systematic review of papers from 1970 to 2010 examines the background and trends of research in this area. The results establish a framework for awareness maintenance and demonstrate trends, gaps, and potentially fruitful areas for future research. In particular, based on 131 papers, the present work proposes a four-phase framework for awareness maintenance that shows promise for real-world applications.  相似文献   

20.
基于VTK的医学图像可视化三维重建   总被引:1,自引:0,他引:1  
医学三维数据场可视化是当前科学计算可视化应用的重点,具有重要的学术意义和应用价值.体绘制是该技术的一个主要的方法.在VTK(Visualization Toolkit)类库提供可视化与显示功能的基础上,主要讨论了光线投射算法进行体数据的绘制的特点,同时采用了包围盒技术改善了光线投射算法的绘制速度.实验结果表明,图像的质量在没有受到影响的前提下,图像的绘制速度得到了大幅度的提高,同时证明了VTK是医学三维数据场可视化的有力工具.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号