基于风险熵模型的安防系统风险与效能评估技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
当前,伴随着安全防范系统的应用已经在公共场所以及住宅小区日益普及,安全防范的案例急剧增加。近年来,我国治安形势严峻,各地“平安城市”建设高速发展,全国各级地方政府和各行各业投入巨资建设各类安全防范系统来全面准确的监控社会治安状况。这些安全防范系统虽然在社会治安防控领域发挥了一定积极作用,但足由于目前国内安防系统风险与防护效能评估侧重于管理和经验层面,仅停留在定性阶段,尚缺乏科学定量评估的理论方法和技术手段,难以支撑完整、高效的综合防控体系的形成和建立。因此,研究安防设施防护能力和风险预测技术,建立系统防护效能和风险客观评价体系,对安全防范系统的防护效能和风险进行科学客观的度量是当前国家安全防范领域发展的重大战略问题。
     本文针对上述问题,在国家自然科学基金面上项目《基于风险熵模型的社会安防系统网络效能评估技术研究》(编号:61170023)、中央高校基本科研业务费专项资金—青年教师资助项目《基于风险熵模型的安全防范效能评估技术研究》(编号:3101014)和武汉大学博士生自主科研基金项目《基于风险熵模型的社会安防系统网络风险评测技术研究》(编号:20102110101000117)的资助下,开展了基于风险熵模型的安防系统风险与效能评估技术研究。本研究在安防节点防护效能的度量方法、安防网络的效能评估方法、安防网络防护能力的优化方法以及安防系统风险预测与效能评估仿真平台四个方向取得了创新性的研究成果。具体如下:
     1.论文借鉴香农信息理论,引入风险熵的概念,并建立节点风险熵模型。研究成果主要有:利用风险熵定量度量安防节点的防护效能的方法,评估指标的权重与隶属度的确定方法,多种防护共同作用下的安防节点防护效能的定量度量方法。
     2.论文将安防节点和交通路网连接形成的广义安防系统抽象为安防网络,在对安防网络的防护效能评估中引入路径代价的概念。研究成果主要有:基于节点风险熵的路径代价的计算方法,安防网络效能的度量模型,安防网络效能与安防网络风险值之间的关系。
     3.论文针对目前安防设施的布局和配置不够合理的问题,研究安防网络防护能力的优化方法,建立安防网络防护能力的组合优化模型,该模型能够从理论上指导资源的分配和调度,使整个安防网络的平均风险值降到最低。研究成果主要有:安防网络中路径的权重确定方法,安防系统防护能力的优化模型的建立,优化模型的快速求解算法研究。
     4.论文针对目前安全防范系统在效能评估技术领域缺乏相应的仿真平台这个问题,利用系统仿真技术结合蒙特卡罗方法建立安防系统风险预测与效能评估仿真平台,通过上述仿真平台的搭建,能够对城市的安全风险进行实时预测,同时可以在有向的城市道路上绘制实时城市风险分布图,并通过对预测结果的分析,找出城市道路中安全防护能力最薄弱的路径。研究成果主要有:风险预测与效能评估仿真平台模块接口分析,蒙特卡罗的数值仿真,实验数据的规范和一致性处理
     本文在基础理论,关键技术、方法和应用等多个层面对安全防范系统的风险与效能评估进行了研究,所取得的研究成果可望突破安防系统防护效能和风险客观评测的技术瓶颈,从而能够及时发现和解决安全防范系统建设与应用过程中可能出现的问题,充分发挥安全防范系统的监测、防护能力,使其真正成为公共安全体系的有力技术支撑,并指导安全防范系统的实践。对建立科学预测、有效防控与高效应急的公共安全体系具有重要的科学意义和应用推广前景。同时,本文的研究方法对其它信息系统的效能评估研究有着重要的借鉴意义。论文最后对整项研究工作进行了总结与展望,提出了一些有待进一步研究的问题。
Currently, with the increasing popularity of the application of crime prevention system from financial, museum, and important research institute to public place and residential area. security prevention cases sharp increase. In recent years, national security issues become serious in China. All parts of the country construct the safety city. Local governments at all levels and types of businesses invested heavily money in building a crime prevention system to monitor the social security situation comprehensively and accurately. Each day although various security facilities have played a positive role in the field of social security prevention. the effectiveness evaluation of crime prevention system focuses on the experience and management level. Due to the absence of theoretical methods and technical means for scientific quantitative evaluation, it is difficult to support a complete and efficient establishment of a comprehensive prevention and control system. So it is a major strategic task to research on risk assessment techniques and the establishment of objective evaluation of the risk in the area of national security prevention.
     To address the above problems, this thesis is funded by the National Natural Science Foundation of China Project "Research on Social Crime Prevention System Risk and Effectiveness Evaluation Based on Risk Entropy Model"(No.61170023). project of central colleges of special funds basic research and operating expenses)-Young Teacher Grant "The Effectiveness Evaluation on Security System Based on Risk Entropy Model"(No.3101014) and doctorial independent research projects of Wuhan University "Research on Network Risk Assessment Technology of Social Safety Protection System Based on Risk Entropy Model"(No.20102110101000117) to lauch the research on risk and effectiveness evaluation technology on crime prevention system based on risk entropy model.This dissertation contributes at four aspects:the method on security node protection effectiveness metric. the effectiveness evaluation and optimization on security network, risk prediction and effectiveness evaluation simulation platform on crime prevention system. Specifically. the research results of this paper are as follows:
     1. This dissertation learning form Shannon information theory put forwards the concept of risk entropy and establishes the node risk entropy model. The research results include the quantitative metric way on security node protection effectivness using risk entropy, the determing method on evaluation index weights and the degree of membership, and security node protection effectiveness measurement method under a variety of protection capability.
     2. This thesis abstracts the board security network which is connected from security node and transportation network into security network. We introduce the concept of path cost in effectiveness evaluation on security network. The research results include the path cost calculation method based on node risk entopy, measurement model on security network effectiveness, and the the relationship between security network effectiveness and risk value.
     3. Focusing the problem of layout and configuration security facilities unreasonably, this paper studies the protection capability optimization method on security network and establish the portfolio optimization model on security network protect capability. This model can guide resource allocation and scheduling in theory and minimize the average risk value of entire security network.The research results include the determing method on path weight of security network, the establishment of protection capability optimization model on crime prevention system, and fast solution algorithm on optimization model.
     4. Focusing on the problem of lacking simulation platform in the field of crime prevention system effectiveness evaluation, this paper firstly builds risk prediction and effectivenss evaluation simulation platform of crime prevention system using system simulation techniques combined with Monte Carlo method. This simulation platform not only forecasts the city risk real time but also draws the urban risk maps on the direction road. And then we can find the protection weakest path on the urban road through analysis of the prediction results. The research results include the interface analysis of risk prediction and effectivness evaluation simulation platform, Monte Carlo numerical simulation technology, consistency and normative approach on experimental data.
     In this dissertation, we study the risk and effectiveness evaluation on crime prevention system from basic theories, key technologies, methods and applications4aspects. The expected research results can breakthrough the technical bottleneck on risk assessment and effectiveness evaluation on crime prevention system. It discovers and solves the problems which may arise in the process of crime prevention system construction and application in time. At the same time, the research results can make crime prevention system monitoring, protection capability into full play and become strong technical support in the public safety system to guide the practice of crime prevention system. The above research result has an important scientific significance and application promotion prospects for the establishment of scientific forecasting, efficient prevention and effective emergency public safety system. This study method has an important reference significane for the other information system effectiveness evaluation. Finally, this paper summarized the research achievement and looked into the future research content.
引文
[1]ASIS International, Academic institutions offering degrees and/or courses in security. http://www.asisonline.org/education/universityPrograms/traditionalprograms.pdf. accessed April 27.2006.
    [2]R.A.Al-Ayat, T.D.Cousins, E.R.Hoover. Assess Update-Current Status and Future Developments [A]. In:INMM31st Annual Meeting[C].Los Angeles, IEEE Press,1990:64-68.
    [3]Anthony C Davies, Sergio A Velastin. A Progess Review of Intelligent CCTV Surveillance System [A]. In:IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems Technology amd Applications[C]. Kingston, IEEE Press,2005:417-423.
    [4]Robert P.Goldman. A Stochastic Model for Intrusions [J]. A.Wespi, G.Vigna, and L.Deri (Eds):RAID 2002,25(16):199-218.
    [5]O.Sheyner, J.Haines, S.Jha, et al. Automated genernation and analysis of attack graphs [A]. In:IEEE Symposium on Security and Privacy[C]. Pittsburgh PA USA, IEEE Press,2002:273-284.
    [6]R.W.Ritchey, P.Ammann. Using model checking to analyze network vulnerabilities [A]. In: Proceedings 2000 IEEE Computer Society Symposium on Security and Privacy[C]. Falls Church VA. IEEE Press,2000:156-165.
    [7]张荣.安全风险评估社会发展迫切的需求[J].中国安防,2006,5(1):51-52.
    [8]李苏宁.安全防范系统风险评估初探[J].安防科技,2007,11(2):7-9.
    [9]陈志华.安全防范系统效能评估研究与实践[J].中国安防,2007,11(3):16-20.
    [10]柴寿椿.安防技术和安防系统.[J].安防科技,2003,9(2):19-21.
    [11]付萍.安全防范系统效能评估研究综述[J].科技资讯,2008,5(2):12-14.
    [12]程敦伍,刘如民,姚红莲.安全防范系统的基本体系[J].地质勘探安全,2000,3(2):7-9.
    [13]杨计增.博物馆安防系统纵深防护体系的设计[J].中国安防产品信息,2006,2(1):38-41.
    [14]杨国胜.试辨析安全防范系统的几个重要概念[J].中国安防,2008,9(3):82-88.
    [15]M. L. Garcia. Development of Security Engineering Curricula at US Universities [A]. In:The 32"d Annual IEEE International Carnahan Conference on Security Technology[C]. NM USA. IEEE Press, 1998:230-233.
    [16]Blattman.D.A. Technological advances allowing integrated physical protection systems to be rapidly deployed and reused with multi-mode performance by unskilled personnel [A]. In:The 30" Annual IEEE International Carnahan Conference on Security Technology[C]. Albuquerque NM USA, IEEE Press,1996:232-243.
    [17]Rinaldi, S.M. Modeling and Simulating Critical Infrastructures and Their Interdependencies [A]. In: The Proceedings of 37th Annual Hawaii International Conference on System Sciences[C]. Albuquerque NM USA, IEEE Press,2004:1-8.
    [18]Andrew J.Clark. Physical Protection of Cryptographic Devices [J].Advances in Cryptology-EUROCRYPT87, LNCS304.1988,4(3):83-93.
    [19]Cano, L.A., Pritchard, D.A., Ellis, D.E. The role of Systems engineering in security systems design [A]. In:The 43rdAnnual IEEE International Carnahan Conference on Security Technology[C]. Albuquerque NM USA, IEEE Press,2009:107-110.
    [20]Wenxiong Kang, Feiqi Deng. Research on Intelligent Visual Surveillance for Public Security [A]. In: The 6th IEEE/ACIS International Conference on Computer and Information Science[C]. China, IEEE Press,2007:824-829.
    [21]陈龙.一体化的新型安全防范系统[J].中国安防产品信息,1997,2(3).:13-15.
    [22]陈志华,张维成.住宅小区安全防范系统可靠性研究[J].警察技术,2001,1(3):24-26.
    [23]Barrett, K..A. It's all about the System:Changing the Way We think about Designing Security Systems [A]. In:The 41st Annual IEEE International Carnahan Conference on Security Technology[C]. Albuquerque, IEEE Press,2007:1-7.
    [24]C.L. Smith. Understanding Concepts in the Defence in Depth Strategy [A]. In:The 37th Annual IEEE International Carnahan Conference on Security Technology[C]. Churchlands WA Australia, IEEE Press.2003:1-7.
    [25]魏莲芳.案例防范技术系统的评估过程研究[J].中国安防,2007,11(3):25-28.
    [26]国家标准编制委员会办公室.“数字化国际”安全防范系统介绍.数字社区&智能家居.2008.3(2):45-49.
    [27]曹水林.秦山核电厂实物保护系统改造研究[D].上海:上海交通大学,2005:47-56.
    [28]沈宁.实物保护系统的分析软件的设计与开发[D].北京:中国原子能科学研究院,2003:38-44.
    [29]陈志华.试论安全防范系统的效能评估[J].中国人民公安大学学报(自然科学版),2006,4(3):94-97.
    [30]李苏宁.FMEA在安全防范技术系统风险分析中的应用[J].中国安防,2008,1(2):29-31.
    [31]汪捷.安全防范系统风险评估体系及其应用[J].中国安防产品信息,2006,2(1):56-58.
    [32]魏莲芳,陈志华.浅谈安防系统中的风险评估[J].中国安防产品信息,2005,4(1):25-28.
    [33]余训峰.安全防范系统线路连接方式的可靠性研究[J].中国安防,2008,1(2):112-115.
    [34]魏莲芳.对视频监控系统的智能评估[J].中国安防,2008,1(2):38-40.
    [35]孙强.定量的安全风险评估计算模型的研究及实现[D].哈尔滨:哈尔滨工程大学,2006:32-39.
    [36]公安部第三研究所:公安部计算机信息系统安全产品质量监督检验中心http://www.mctc.gov.cn/main.htm.
    [37]中华人民共和国国家标准.安全防范工程技术规范(GB 50348-2004)[S].2004.
    [38]中华人民共和国国家标准.入侵报警系统工程设计规范(GB 50394-2007)[S].2007.
    [39]Xi Guo, Ruimin Hu. Jingjing Dai,et al. Study On The Effectiveness Evaluation For Security System Based On Fuzzy Theory and Risk Entropy [A]. In:The 10th International Probabilistic Safety Assessment & Management Conference [C]. AM, Elisver,2010:123-128.
    [40]Xi Guo. Ruimin Hu. The Effectiveness Evaluation for Security System Based on Risk Entropy Model and Bayesian Network Theory [A]. In:The 44th IEEE International Conference on Security Technology[C]. Albuquerque NM USA, IEEE Press,2010:57-65.
    [41]Xi Guo, Ruimin Hu, Haitao Lv. Combinatorial Optimization Technology Application for the Risk Optimization of Crime Prevention System [A].In:The 2nd International Workshop on Education Technology and Computer Science[C]. Wuhan China, IEEE Press,2010:92-95.
    [42]Xi Guo, Ruimin Hu, Jingjing Dai. The Comprehensive Assessment Method for Community Risk Based on AHP and Neural Network [A].In:The 2nd IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing[C].Wuhan China, IEEE Press.2010: 410-413.
    [43]Xi Guo, Ruimin Hu, Yimin Wang. Quantitative Evaluation of Crime Prevention System in the Museum [A].In:The 2nd IEEE International Conference on Information Management and Engineering[C]. Chendu China, IEEE Press,2010:199-202.
    [44]Xi Guo, Ruimin Hu, Haitao Lv. The Architecture and Application of University Emergency Information System [A].In:IEEE International Conference on Information Engineering and Computer Science[C]. Wuhan China, IEEE Press,2009:1-5.
    [45]Gregory Howard Graves. Analytical Foundations of Physical Security System Assessment [D]. Doctoral Dissertation United States Military Academy. August 2006:17-28.
    [46]Weibing Liu, Min Li. Dynamic decision making in social security system [A].In:IEEE International Conference on Management Science and Industrial Engineering[C]. Wuhan China, IEEE Press, 2011:76-79.
    [47]Mi Young Nam, HakChul Shin, Yongzhe Xu, et al. An adaptive normalcy decision for video surveillance security system [A].In:IEEE International Conference on Consumer Electronics[C]. South Korea, IEEE Press,2011:733-734.
    [48]James D. William. Physical Protection System Design and Evaluation Sandia National Laboratories.DE-AC04-94A185000
    [49]Tang Dan, Xiandong Yin, Fang Ni, et al. Physical Protection System and Vulnerability Analysis Program in China[J]军控科学与核查技术(英文版),2001,3:16-26.
    [50]EASI estimate of adversary sequence interruption on an IBM PC. SAND Report8511051985.pp: 1-63.
    [51]H. A. Bennett. The EASI Approach to Physical Security Evaluation. S AND76-0500. Sandia National Laboratories.1977.
    [52]黄新.美国的实体保卫系统简介[J].公安大学学报,1988,2(6):12-15.
    [53]Matter, J.C. SAVI:A PC-Based Vulnerability Assessment Program. SAND88-1279, July 1988.
    [54]L. R. Doyon. Stochastic modeling of facility security-systems for analytical solutions [J].Computers& Industrial Engineering,1981,5(2):127-138.
    [55]M. J. Hicks, M. S. Snell, J. S. Sandoval, et al. Cost and performance analysis of physical protection systems-a case study [A]. In:Proceedings 32nd Annual 1998 International Carnahan Conference on Security Technology. Albuquerque NM, IEEE Press,1998:79-84.
    [56]Chansoo Kim, Sangman Kwak, Chang-Hyun Chung. A Simulation Methodlogy for the Evaluation of the Physical Protection System in Nuclear Power Plants [J]. Relationship between Security and Safety. 2006,3:320-321.
    [57]J. E. Kobza, S. H. Jacobson. Probability models for access security system architectures [J]. The Journal of the Operational Research Society,1997,48(3):255-263.
    [58]C.L. Smith. The development of a Security Systems Research and Test Laboratory at University [A]. In:Proceedings of 2004 IEEE International Carnahan Conference on Security Technology [C]. Perth WA Australia. IEEE Press,2004:111-115.
    [59]M. L. Garcia. The Design and Evaluation of Physical Protection Systems [M], Butterworth-Heinemann:Boston,2001:135-149.
    [60]J. Sher. C. Guryan. Network optimization methods for terrorism vulnerability assessment [A]. In: Presented at the 71st Military Operations Research Society Symposium[C]. Quantico, Virginia, IEEE Press.2003:39-46.
    [61]R. J. Fischer, G. Green. Introduction to Security [M],7th Edition, Elsevier, Boston,2004:76-83.
    [62]T. Y. Hsiao. C. A. Shieh. C. N. Lu. Reliability Evaluation of a Taipower System Protection Scheme [A]. In:IEEE Power Systems Conference and Exposition [C]. Kaohsiung, Taiwan, IEEE Press,2004:78-85.
    [63]Depoy, J.Phelan, J.Sholander, et al. Risk assessment for physical and cyber attacks on critical infrastructures [A]. In:IEEE military communications conference [C]. Albuquerque NM, IEEE Press, 2005:39-44.
    [64]M. L. Garcia. Vulnerability Assessment of Physical Protection Systems. Elsevier [M].2005:157-179
    [65]Darby, J., Phelan, J.Sholander, et al. Evidence-Based Techniques for Evaluating Cyber Protection Systems for Critical Infrastructures [A]. In:IEEE military communications conference [C]. Albuquerque NM, IEEE, Press,2006:1-10.
    [66]Hyun-Jeong Jo, Jong-Gyu Hwang. Investigation of Risk Analysis Methods for Safety Assurance in the Train Control System [A]. In:Proceeding of International Conference on Electrical Machines and Systems[C].Korea, IEEE Press,2007:56-64.
    [67]Lovecek Tomas. Present and future ways of physical property protection. Komunikacie [J].2008, 10(1):35-39.
    [68]Itakura Shuichiro. Nakaqome Yoshihiro. New evaluation system for antisabotage physical protection Transactions of the Atomic Energy Society of Japan [J].2008,7(1):12-20.
    [69]Jonathan Pollet, Joe Cummins. All Hazards Approach for Assessing Readiness of Critical Infrastructure [A]. In:IEEE Conference on Technologies for Homeland Security [C].IEEE Press,2009: 366-372.
    [70]Sendi, A.S., Jabbarifar, M., Shajari, M., et al. FEMRA:Fuzzy Expert Model for Risk Assessment [A]. In:Fifth International Conference on Internet Monitoring and Protection[C]. Montreal QC Canada, IEEE Press,2010:48-52.
    [71]Sandia National Laboratories, "A risk assessment methodology (RAM) for physical security" white paper 2006, [Online]. Available:http://www.sandia.gov/ram/RAM%20White%20Paper.pdf, accessed April 27,2006.
    [72]K. Smith, C. B. Barrett, P. W. Box. Participatory risk mapping for targeting research and assistance: With an example from east African pastoralists [J]. World Development,2000,28:1945-1959.
    [73]中国国家知识产权局数据库http://www.sipo.gov.cn/sipo/zljs/default.htm
    [74]US Patent and Trademark Office, http://www.uspto.gov/. European Patent Office. http://ep.espacenet.com/
    [75]李远远.基于粗糙集的指标体系构建及综合评价方法研究[D].武汉:武汉理工大学,2009:33-40.
    [76]车军.船舶避碰人为因素分析与评价[D].大连:大连理工大学,2010:45-51.
    [77]李苏宁.安全防范系统的评价模式研究[D].沈阳:沈阳航空工业学院,2008:28-34.
    [78]Norman, B.C., Adams, D.G. Virtual Perimeter Security (VPS) in a Physical Protection System [J]. IEEE Aerospace and Electrnoic Systems Magazine.2007,22(4):30-33.
    [79]Van Voorthuijsen, G.van Hoof, H., Klima, M, et al. CCTV effectiveness study [A]. In:The 39th Annual IEEE International Carnahan Conference on Security Technology[C]. Hague Netherlands, IEEE Press, 2005:105-108.
    [80]Kristl A. Gordon and Gregory D. Wyss. Comparison of Two Methods to Quantify Cyber and Physical Security Effectiveness. SAND2005-7177.2005:1-18.
    [81]Jennifer DePoy, James Phelan, et al. Critical Infrastructure Systems of Systems Assessment Methodology, SAND2006-6399 2006:1-180.
    [82]中华人民共和国国家标准.安全防范工程技术规范(GB 50348-2004)[S].2004.
    [83]中华人民共和国国家标准.入侵报警系统工程设计规范(GB 50394-2007)[S].2007.
    [84]中华人民共和国国家标准.民用闭路监视电视系统工程技术规范(GB 50198-1994)[S].1994.
    [85]中华人民共和国公共安全行业标准.入侵报警系统技术要求(GA/T 368-2001)[S].2001.
    [86]Han Lin, Burnett, D., Sheaffer, D, et al. Applying decision analysis process to exterior physical security system technology design and selection [A]. In:The 43rd IEEE International Carnahan Conference on Security Technology [C]. Albuquerque NM USA, IEEE Press,2009:312-316.
    [87]Jiye Liang, Yuhua Qian. Information granules and entropy theory in information systems [J]. Science in China series information sciences,2008,51, (10):1427-1444.
    [88]Bruers Stijn. A discussion on maximum entropy production and information theory [J]. Journal of physics A-mathematical and theoretical,2007,40(27):7441-7450.
    [89]Yong Wang. Analyse on Limitations of Information Entropy [A].In:IEEE International Conference on Artificial Intelligence and Computational Intelligence[C]. Guilin China, IEEE Press,2009:85-88.
    [90]Dobrushin, R. Survey of Soviet research in information theory [J]. IEEE Transactions on Information Theory,1972,18 (6):703-724.
    [91]Jiang Rong, Liao Hongzhi, Yu Jiankun, et al. An Approach to Analysis and Measurement of the Stability of Web Community Based on Dissipative Structure Theory and Information Entropy [A].In: The Fifth International Conference on Natural Computation[C]. Kunming China, IEEE Press. 2009:326-329.
    [92]Nan Tu, Tian Zhang, Qiuyun He, et al. Applying combined AHP-QFD method in new product development:A case study in developing new sports earphone [A]. In:IEEE International Conference on Management Science and Industrial Engineering[C]. Shenzhen China, IEEE Press,2011:80-85.
    [93]Bernardon Daniel Pinheiro, Sperandio Mauricio, Garcia Vinicius Jacques. AHP Decision-Making Algorithm to Allocate Remotely Controlled Switches in Distribution Networks [J]. IEEE Transactions on Power Delivery,2011,26 (3):1884-1892.
    [94]Hwang, Ju-Won, Lee, et al. Structure evolution of dynamic Bayesian network for traffic accident detection [A].In:IEEE Congress on Evolutionary Computation[C]. Seoul South Korea, IEEE Press. 2011:1655-1671.
    [95]Chin, G., Choudhury, S., Kangas, L, et al. Fault Detection in Distributed Climate Sensor Networks Using Dynamic Bayesian Network [A]. In:The Sixth IEEE International Conference on e-Science[C]. Richland WA USA. IEEE Press,2010:121-128.
    [96]Angel Gomez-Villegas Miguel,Main Paloma, Navarro Hilario. Evaluating the difference between graph structures in Gaussian Bayesian networks [J]. Expert Systems with Applications,2011, 38(10):12409-12414.
    [97]Miguel Antonio,Ortega Alfonso,Buera Luis. Bayesian Networks for Discrete Observation Distributions in Speech Recognition [J]. IEEE transactions on audio speech and language processing, 2011.19(6):1476-1489.
    [98]Baojun Zhang, Kuijun Lu, Xuezeng Pan, et al. Reverse Search Based Network Attack Graph Generation [A]. In:IEEE International Conference on Computational Intelligence and Software Engineering[C]. Hangzhou China, IEEE Press,2009:1-4.
    [99]Ahmadinejad Seyed Hossein, Jalili Saeed, Abadi Mandi. A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs [J]. Computer Networks,2011,55 (9):2221-2240.
    [100]Ghosh. N., Ghosh, S.K.. An Approach for Security Assessment of Network Configurations Using Attack Graph [A].In:The First International Conference on Networks and Communications[C]. Kharagpur India. IEEE Press,2009:283-288.
    [101]Kijsanayothin, P., Hewett, R. Analytical Approach to Attack Graph Analysis for Network Security [A]. In:The 10th International Conference on Availability, Reliability, and Security[C]. Abilene TX, IEEE Press,2010:25-32.
    [102]胡瑞敏.郭熹.戴晶晶.安防系统中防护能力的优化方法:中国,201010029039.8[P].2010-01-21.
    [103]Xia F, Meliopoulos A P S. A Methodology for Probabilistic simultaneous transfer capability analysis [J]. IEEE Transactions on Power Systems,1996,11(3):1269-1278.
    [104]Yu-Hui Tao, Barry L Nelson. A Conceptual Framework for Simulation Experiment Design and Analysis [A]. In:The Proceedings of Winter Simulation Conference[C]. Columbus OH, IEEE Press, 1997:1237-1244.
    [105]Liu Jian, Yang Wenyu, Zhao Gaochang. Comparison of expansion planning alogithms for distribution networks based on Monte Carlo simulation [J]. Proceedings of the CSEE,2006,26(10):73-78(in Chinese).
    [106]Borqes C L T, Falcao D M, Mello J C O, et al. Composite reliability evaluation by sequential Monte Carlo simulation on parallel and distributed processing environments [J].IEEE Transactions on Power Systems,2001.16(5):203-209.
    [107]Vermaak, J. Godsill. S. JPerez. P. Monte Carlo filtering for multi target tracking and data association [J]. IEEE Transactions on Aerospace and Electronic Systems,2005,41 (1):309-332.
    [108]Hue, C.Le Cadre, J.-P.Perez. P. Sequential Monte Carlo methods for multiple target tracking and data fusion [J]. IEEE Transactions on Signal Processing,2002,50 (2):309-325.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700