检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]湖南商学院信息系,湖南长沙410205 [2]天津社会科学院,天津300191
出 处:《武汉科技大学学报(社会科学版)》2008年第4期62-67,共6页Journal of Wuhan University of Science and Technology:Social Science Edition
基 金:湖南省自然科学基金项目(编号:05JJ40103);湖南省社会科学基金项目(编号:05YB95)
摘 要:在不破坏网络的整体性的前提下,提出threat-CIM方法,给出直接威胁、间接威胁和威胁的定义,在威胁定义的基础上定义防守方各点的条件威胁,解决了边赋权网络节点重要性测度问题;以条件威胁的大小来测量防守方各点的重要性,并进行仿真分析;通过攻守方所占区域的变化,得出防守方的节点重要性也发生相应的变化这一结论;在文章的结尾就攻防双方威胁的关系问题予以解决。Without destroying network integrity, threat-CIM is put forward and threat, direct threat as well as indirect threat are defined. Based on the definition of threat, conditional threat of defense node is defined, which solves the importance measurement for node within an edge-weighted network. The conditional threat of defense node is used to measure the importance of every node, with simulative analysis conducted. It is concluded that the importance of defense node varies with the changed area occupied by attacker and defender. And the end of the article resolves the threat relation between attacker and defender.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.141.244.88