{"title":"网络环境下信息竞争模型与动态防御系统研究","authors":"Wei-men Gao, Gui-xiang Li","doi":"10.1109/IPTC.2010.66","DOIUrl":null,"url":null,"abstract":"This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation of the model simulation results to validate the safety of defense capability.","PeriodicalId":178979,"journal":{"name":"International Symposium on Information Processing and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Inform Rivalry Model and Dynamic Defense System under Network Environment\",\"authors\":\"Wei-men Gao, Gui-xiang Li\",\"doi\":\"10.1109/IPTC.2010.66\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation of the model simulation results to validate the safety of defense capability.\",\"PeriodicalId\":178979,\"journal\":{\"name\":\"International Symposium on Information Processing and Trusted Computing\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Symposium on Information Processing and Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPTC.2010.66\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Information Processing and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPTC.2010.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Inform Rivalry Model and Dynamic Defense System under Network Environment
This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation of the model simulation results to validate the safety of defense capability.