Computer and Modernization ›› 2019, Vol. 0 ›› Issue (02): 107-.doi: 10.3969/j.issn.1006-2475.2019.02.019
Previous Articles Next Articles
Received:
2018-10-17
Online:
2019-02-25
Published:
2019-02-26
CLC Number:
YIN Fa, AI Zhong-liang. Network Confrontation Deduction System Based on Offensive and Defensive Action Chain[J]. Computer and Modernization, 2019, 0(02): 107-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2019.02.019
[1] 贺劼,练晓谦,齐权,等. 大规模网络对抗兵棋推演系统关键技术探讨[J]. 通信技术, 2018,51(2):450-456. [2] 韩志军,柳少军,唐宇波,等. 计算机兵棋推演系统研究[J]. 计算机仿真, 2011,28(4):10-13. [3] 雷璟. 网络空间攻防对抗技术及其系统实现方案[J]. 电讯技术, 2013,53(11):1494-1499. [4] 王煜. 美军“X计划”网络战系统发展及建设思路研究[J]. 无线电工程, 2018,48(5):367-371. [5] 司成. 基于本体的网络威胁态势推演与评估技术研究[D]. 郑州:解放军信息工程大学, 2015. [6] 王坤,邱辉,杨豪璞. 基于攻击模式识别的网络安全态势评估方法[J]. 计算机应用, 2016,36(1):194-198. [7] 仇建伟,王川,程向力. 面向服务的战场态势感知与协同技术研究[J]. 中国电子科学研究院学报, 2012,7(2):129-135. [8] 王昊,夏慧,陈威,等. 基于分治策略的分布式调度自动化系统稳态监控网络拓扑分析[J]. 电力系统保护与控制, 2015,43(18):101-107. [9] 邓克波,朱晶,韩素颖,等. 面向作战方案分析的计算机兵棋推演系统[J]. 指挥信息系统与技术, 2016,7(5):73-77. [10]牛通,田志宏. 基于博弈论和网络弱点分析的网络主动防御技术研究[J]. 智能计算机与应用, 2012,2(3):55-60. [11]李彦广. 网络攻防仿真系统终端子系统的设计与实现[J]. 计算机与现代化, 2014(3):169-172. [12]INGOLS K, LIPPMANN R, PIWOWARSKI K. Practical attack graph generation for network defense[C]// Proceedings of the 22nd Annual Computer Security Applications Conference. 2006:121-130. [13]HUTCHINS E M, CLOPPERT M J, AMIN R M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains[C]// Proceedings of the 6th International Conference on Information Warfare and Security (ICIW 11). 2011:113-125. [14]吕佳. 网络对抗下的DDoS防护体系模型研究[D]. 郑州:解放军信息工程大学, 2011. [15]王红凯,于晓文,张旭东. 基于攻击检测和节点脆弱性的网络安全风险分析方法[J]. 计算机与现代化, 2017(1):96-100. [16]张训立,俞坤东. 基于UML的兵棋推演系统建模[J]. 军事运筹与系统工程, 2014,28(2):50-54. [17]吴坤,刘世龙. 联合作战模拟训练仿真体系探索[J]. 信息化研究, 2014,40(4):4-7. [18]冯同寒,艾中良. 基于GIS的网络拓扑构建与展示技术方法研究[J]. 计算机与现代化, 2014(9):20-24. [19]李艳. 动态攻击网络演化建模与防御策略研究[D]. 西安:西安建筑科技大学, 2017. [20]郑贵省,车亚辉,李月明. 运输方案推演态势回放系统设计与实现[J]. 军事交通学院学报, 2016,18(6):86-89. [21]吴建台,刘光杰,刘伟伟,等. 一种基于关联分析和HMM的网络安全态势评估方法[J]. 计算机与现代化, 2018(6):30-36. [22]程路尧. 作战方案推演系统的设计与实现[J]. 舰船电子工程, 2014,34(11):9-12. [23]罗文芬. 基于GIS的战场态势推演系统的研究与实现[D]. 武汉:中国地质大学, 2011. |
[1] | HE Sida, CHEN Pinghua. Intent-based Lightweight Self-Attention Network for Sequential Recommendation [J]. Computer and Modernization, 2024, 0(12): 1-9. |
[2] | ZHENG Jiuchao, ZHAO Xinyuan. Entity Linking Method Based on Topics and Description Information [J]. Computer and Modernization, 2024, 0(12): 10-14. |
[3] | ZHAO Chenyang, XUE Tao, LIU Junhua. Fashion Clothing Pattern Generation Based on Improved Stable Diffusion [J]. Computer and Modernization, 2024, 0(12): 15-23. |
[4] | HUANG Tingpei1, MA Lubiao1, LI Shibao2, LIU Jianhang1. Gesture Recognition Method Based on WiFi and Prototypical Network [J]. Computer and Modernization, 2024, 0(12): 34-39. |
[5] | LIU Yunhai1, Feng Guang1, WU Xiaoting2, YANG Qun2 . Safety Helmet Wearing Detection Algorithm for Complex Construction Scenes [J]. Computer and Modernization, 2024, 0(12): 66-71. |
[6] | WANG Yanyuan, MAO Zhengchong. Detection and Recognition Algorithms for Chinese and English Scene Text Images [J]. Computer and Modernization, 2024, 0(12): 84-90. |
[7] | ZHANG Kun1, ZHANG Yongwei1, WU Yongcheng1, ZHANG Xiaowen2, ZHAI Shichen2. An LLM-based Method for Automatic Construction of Equipment Failure Knowledge Graphs [J]. Computer and Modernization, 2024, 0(11): 46-53. |
[8] | ZHANG Zhixia, QIN Zhiyi. Network Public Opinion Prediction Based on Variational Mode Decomposition and IGJO-SVR [J]. Computer and Modernization, 2024, 0(11): 77-83. |
[9] | WAN Hongwei, CHEN Pinghua. Polyp Segmentation Based on Involution and Coordinate Reverse Attention [J]. Computer and Modernization, 2024, 0(11): 84-90. |
[10] | ZHANG Yu1, 2, LI Jing1, 2, MA Ming1, 2, WANG Zhongxiang1, 2, SUN Yan1, 2. YOLOLW: A Novel Lightweight Object Detection Model [J]. Computer and Modernization, 2024, 0(11): 91-98. |
[11] | DONG Yuwen. Multi-scale Moving Object Detection Algorithm Based on Improved YOLOv7-tiny [J]. Computer and Modernization, 2024, 0(11): 99-105. |
[12] | QI Xian, LIU Daming, CHANG Jiaxin. Multi-view 3D Reconstruction Based on Improved Self-attention Mechanism [J]. Computer and Modernization, 2024, 0(11): 106-112. |
[13] | CHEN Kai1, LI Yiting1, 2, QUAN Huafeng1. A River Discarded Bottles Detection Method Based on Improved YOLOv8 [J]. Computer and Modernization, 2024, 0(11): 113-120. |
[14] | YANG Qingwu, LUO Xiaohui, LIU Xin. Industrial Image Circle Detection Algorithm Based on Edge Drawing [J]. Computer and Modernization, 2024, 0(11): 121-126. |
[15] | ZHOU Anda, TANG Chaoying. Semantic Segmentation Algorithm for Rainy Road Scene and Its Mobile Deployment [J]. Computer and Modernization, 2024, 0(10): 7-13. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||