ID |
原文 |
译文 |
46696 |
提出一种基于现场总线设备建模的入侵检测方法, |
An industrial control system intrusion detection method based on field bus network equipment simulation was proposed. |
46697 |
利用仿真建模模拟控制器的真实功能,对控制器进行保护; |
The method prevented control program from being tampered or destroyed based on controller simulation modelling. |
46698 |
并通过系统辨识建模的方法建立被控对象模型,保证控制器获得的被控对象数据真实准确, |
Controlled object simulation modelling was designed for ensuring that the system input was credible. |
46699 |
从而实现对工业控制网络的入侵检测。 |
Thus the intrusion detection of industrial control network was realized. |
46700 |
经实验验证,所提入侵检测方法检测效果较好。 |
At last, the results indicate that the proposed intrusion detecting method is available. |
46701 |
采用 CTMC 模型分析了网络状态的统计特性, |
The statistical characteristics of the network state changes were analyzed by using the CTMC model. |
46702 |
考虑各个次用户感知能力的差异性,分别从主用户和次用户的角度出发,建立了 2 个关于次用户调度方案的整数规划问题。 |
Considerations the difference of each secondary user’s sensing ability, two integer programming problems on cooperative sensing scheduling scheme were established from two aspects: the primary users and the secondary users respectively. |
46703 |
提出了通过离散粒子群优化算法求解所建问题,并与传统的随机调度方案和基于信噪比的贪婪调度方案进行了比较。 |
A discrete particle swarm optimization algorithm was proposed to solve the integer programming problems, and compared with the traditional random scheduling scheme and greedy scheduling scheme based on SNR. |
46704 |
仿真结果表明,所提调度方案获得的感知性能更高。 |
The simulation results show that the cooperative sensing scheduling scheme based on discrete particle swarm optimization algorithm is superior to random scheduling scheme and greedy scheduling scheme based on the SNR, which gets a higher spectrum sensing accuracy. |
46705 |
侧信道攻击是当前云计算与数据中心环境下多租户间信息泄露的主要途径, |
Side-channel attacks were the main ways of multi-tenant information leakage in the cloud computing and data center environments. |