{"title":"网络安全相关解决方案","authors":"P. Sapaty","doi":"10.1108/978-1-78973-715-820191006","DOIUrl":null,"url":null,"abstract":"In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.","PeriodicalId":265742,"journal":{"name":"Complexity in International Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Networked Security Related Solutions\",\"authors\":\"P. Sapaty\",\"doi\":\"10.1108/978-1-78973-715-820191006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.\",\"PeriodicalId\":265742,\"journal\":{\"name\":\"Complexity in International Security\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Complexity in International Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/978-1-78973-715-820191006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Complexity in International Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/978-1-78973-715-820191006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.