网络安全相关解决方案

P. Sapaty
{"title":"网络安全相关解决方案","authors":"P. Sapaty","doi":"10.1108/978-1-78973-715-820191006","DOIUrl":null,"url":null,"abstract":"In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.","PeriodicalId":265742,"journal":{"name":"Complexity in International Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Networked Security Related Solutions\",\"authors\":\"P. Sapaty\",\"doi\":\"10.1108/978-1-78973-715-820191006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.\",\"PeriodicalId\":265742,\"journal\":{\"name\":\"Complexity in International Security\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Complexity in International Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/978-1-78973-715-820191006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Complexity in International Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/978-1-78973-715-820191006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本章将用SGL描述不同的网络操作,这对于安全应用程序可能很有用。表达了基本的网络管理机制,即使传统的通信和互联网包括受到破坏,也能够自行工作。这包括从头开始创建网络、查找节点之间的路径,以及创建路由表(RT)以实现最短路径通信。还展示了SGT的使用,通过发现其中的强和弱组件,并在危机情况下改变其拓扑结构,来分析具有社会味道的分布式网络。另一个例子是如何在一个分布式的社会网络中勾勒出不同的社区,找到它们的地形中心,评估它们之间的物理距离,以预测可能的社会冲突,同时反复这样做,同时模拟个人的空间流动性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Networked Security Related Solutions
In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信