ATTACKER

作品数:15被引量:15H指数:2
导出分析报告
相关领域:自动化与计算机技术更多>>
相关期刊:《CSEE Journal of Power and Energy Systems》《Journal of Autonomous Intelligence》《计算机应用文摘》《Journal of Information Security》更多>>
相关基金:国家自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Optimal noise injection energy allocation and collection of energy harvesting attacker under quality-changeable environment
《Science China(Information Sciences)》2024年第11期363-364,共2页Lu DONG Tao HAN Xin YUAN Chao DENG 
supported by the National Natural Science Foundation of China(Grant Nos.62173251,62203113)。
Advanced persistent threat(APT)is a powerful attack pattern in which attackers lurk in the system,waiting for opportune moments and launching attacks.Remote state estimation(RSE)is an essential scenario in the cyber-p...
关键词:estimation HARVESTING INJECTION 
A Novel Defender-Attacker-Defender Model for Resilient Distributed Generator Planning with Network Reconfiguration and Demand Response
《Energy Engineering》2024年第5期1223-1243,共21页Wenlu Ji Teng Tu Nan Ma 
supported by the Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.,China (J2022160,Research on Key Technologies of Distributed Power Dispatching Control for Resilience Improvement of Distribution Networks).
To improve the resilience of a distribution system against extreme weather,a fuel-based distributed generator(DG)allocation model is proposed in this study.In this model,the DGs are placed at the planning stage.When a...
关键词:Distribution system RESILIENCE defender-attacker-defender distributed generator demand response microgrids formation 
Multi-stage Defender-Attacker-Defender Model for Distribution System Resilience Enhancement in Ice Storms with Line Hardening,Mobile Device and Repair Crew Dispatching被引量:2
《CSEE Journal of Power and Energy Systems》2023年第3期1103-1118,共16页Ran Tao Dongmei Zhao Haoxiang Wang Xuan Xia 
This paper proposes a co-optimal strategy using line hardening,mobile devices(mobile ice-melting device,mobile emergency generator,mobile energy storage system),and repair crew dispatching to improve distribution syst...
关键词:Defender-attacker-defender model distribution system resilience ice storm line hardening mobile device repair crew 
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
《Journal of Information Security》2022年第4期323-336,共14页Carlisle Adams 
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the...
关键词:Security Analysis Identity-Based Encryption (IBE) Reducing Trust Preserving Privacy Honest-but-Curious Attacker Malicious Attacker 
Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker被引量:1
《Science China(Information Sciences)》2022年第1期286-287,共2页Yin TENG Jiayu LI Mengxing HUANG Lin LIU Guiyang XIA Xiaobo ZHOU Feng SHU Jiangzhou WANG 
supported by National Natural Science Foundation of China(Grant Nos.6207-1234,61771244,61901121)。
Dear editor,Directional modulation(DM),as an advanced physical-layer security(PLS)transmission technique,is suitable for the line-of-sight(LoS)propagation channel.In[1],the authors presented a DM technique that uses t...
关键词:NETWORKS DUPLEX directional 
Playing repeated security games with multiple attacker types:a Q-iteration on a linear programming approach
《Journal of Control and Decision》2021年第3期322-330,共9页Ling Chen Mingchu Li Yingmo Jie 
The paper is supported by theNationalNatural Science Foundation of China[grant nos 61572095,61877007].
This paper investigates infinite horizon repeated security games with one defender and multiple attacker types.The incomplete information brings uncertainty of attackers’behaviour for the defender.Under the uncertain...
关键词:Multi-objective repeated security game(MORSG) Q-iteration regret Pareto frontier 
Cooperative prediction guidance law in target-attacker-defender scenario被引量:5
《Science China(Information Sciences)》2021年第4期216-218,共3页Heng SHI Jihong ZHU Minchi KUANG Xiaming YUAN 
supported by National Natural Science Foundation of China(Grant Nos.61603210,61673240)。
Dear editor,The defending guidance problem for the target-attackerdefender(TAD)scenario is a challenge.The attacker(A)refers to the attacking missile,whose objective is to intercept the target aircraft(T),while the ta...
关键词:MISSILE PREDICTION EDITOR 
Attack and Defense Strategies in Complex Networks Based on Game Theory被引量:5
《Journal of Systems Science & Complexity》2019年第6期1630-1640,共11页LI Yapeng DENG Ye XIAO Yu WU Jun 
supported by the National Natural Science Foundation of China under Grant Nos.71871217 and 71371185;the Natural Science Foundation of Hunan Province under Grant No.2019JJ20019
To investigate the attack and defense strategies in complex net works,the authors propose a two-player zero-sum static game model with complete information which considers attack and defense strategies simultaneously....
关键词:Attack and defense strategies attacker-defender game complex net works Nash equilibriums 
Open-loop solution of a defender–attacker–target game:penalty function approach
《Journal of Control and Decision》2019年第3期166-190,共25页Vladimir Turetsky Valery Y.Glizer 
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu...
关键词:Defender–attacker–target problem pursuit-evasion differential game zero-sum linear-quadratic game terminal state inequality constraint 
Security Challenges and Countermeasures for the Heterogeneity of IoT Applications
《Journal of Autonomous Intelligence》2018年第2期16-22,共7页Deepak Choudhary 
The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and ho...
关键词:IOT HETEROGENEITY SECURITY Networking cyber-attacker deployment DATAGRAM transport layer SECURITY CRYPTOGRAPHY 
检索报告 对象比较 聚类工具 使用帮助 返回顶部