一种基于聚集超级节点的犘2 犘网络信任模型
2022-05-04 14:06:01 733KB 文档资料
安全技术-网络信息-在线社会网络信任计算与挖掘分析中若干模型与算.pdf
2022-05-02 11:00:31 6.8MB 文档资料 安全 网络
安全技术-网络信息-移动AdHoc网络信任模型研究.pdf
2022-05-01 22:01:27 3.45MB 文档资料 安全 网络
密码技术作为网络安全的基础性核心技术,是信息保护和网络信任体系建设的基础,是保障网络空间安全的关键技术。
2022-01-20 19:00:06 1.12MB 网络 安全 web安全 密码标准
1
自动驾驶汽车技术近年来得到了广泛研究与快速发展,但在复杂的交通场景下,自动驾驶汽车面对突然出现的行驶车辆并不能及时避让。针对此问题,基于区块链技术提出智能网联车队的协同轨迹预测系统,智能网联车队中的各个节点与路边基础设施通过长短时记忆网络(LSTM)模型对周边车辆的运动轨迹进行预判,并将得到的结果进行分享,利用区块链技术,智能网联车队与路边基础设施可以对其接收到的信息进行评分,并将汇总后的评分以区块的形式加入存储信誉评分的区块链中。通过该评分,智能网联车队中的车辆可以根据车队中其他节点的信誉值来判断其是否可信,低信誉值节点传来的信息将不予理睬,从而实现了协同驾驶。实验分析表明,所提LSTM模型能够较为准确地预测周边车辆5 s内的行驶轨迹,而所提的系统在提升智能网联车队的行驶安全上起到了明显的效果。
1
摘  要: 对P2P网络存在的问题进行了分析,阐述了建立P2P网络信任模型的需求。在对现有P2P网络中的信任模型进行总结归纳后,指出了以后研究的方向。对仿真系统进行了性能测试,并对测试结果进行了分析。仿真结果表明,该模型对于信息窃取、信息篡改等类型的恶意攻击有较好的抑制作用。   随着P2P系统的广泛应用,安全问题也随之产生。主要体现在以下几个方面:由于共享特性带来的安全问题、中间节点的恶意攻击以及针对P2P系统结构安全漏洞的攻击等。在P2P系统中节点的信息传输往往需要经过多个中间节点的传递,由中间节点产生的威胁最大也最难防范。中间节点恶意攻击包括信息窃取、信息篡改等。   随着Interne
2021-12-20 21:47:07 213KB 分析P2P网络信任机制研究 其它
1
People increasingly use social networks to manage various aspects of their lives such as communication, collaboration, and information sharing. A user’s network of friends may offer a wide range of important benefits such as receiving online help and support and the ability to exploit professional opportunities. One of the most profound properties of social networks is their dynamic nature governed by people constantly joining and leaving the social networks. The circle of friends may frequently change when people establish friendship through social links or when their interest in a social relationship ends and the link is removed. This book introduces novel techniques and algorithms for social network-based recommender systems. Here, concepts such as link prediction using graph patterns, following recommendation based on user authority, strategic partner selection in collaborative systems, and network formation based on “social brokers” are presented. In this book, well-established graph models such as the notion of hubs and authorities provide the basis for authority-based recommendation and are systematically extended towards a unified Hyperlink Induced Topic Search (HITS) and personalized PageRank model. Detailed experiments using various real-world datasets and systematic evaluation of recommendation results proof the applicability of the presented concepts.
2021-12-16 10:53:12 3.25MB 推荐系统 社交网络 信任计算 链路预测
1
跨境电子商务进口市场网络信任问题经济研究——以淘宝全球购护肤品为例.docx
2021-10-14 10:05:02 133KB 网络
Webtrust2020年发布的审计标准中文版,CA机构规范建设运营可使用。
2021-10-11 17:00:07 554KB webtrust CA 认证机构 网络信任
1
1. 网络信任模型概述 ....................................................................................................... 1 2. 5G 生态场景与角色定义 ............................................................................................. 3 2.1. 概述.....................................................................................................................................................3 2.2. 场景一:运营商内的虚拟化网络部署 ..........................................................................................3 2.3. 场景二:国际漫游 ............................................................................................................................6 2.4. 场景三:远程租车 ............................................................................................................................7 2.5. 场景四:面向垂直行业的网络能力开放 ......................................................................................9 2.6. 场景 5:供应链 .............................................................................................................................. 11 2.7. 小结 .................................................................................................................................................. 12 3. 面向 5G 生态的信任关系分析 ................................................................................. 13 3.1. 概述 .................................................................................................................................................. 13 3.2. 信任等级的定义 ............................................................................................................................. 14 3.3. 信任的评估标准 ............................................................................................................................. 17 3.4. 信任关系分析 ................................................................................................................................. 19 4. 网络信任模型 ........................................................................................................
2021-09-15 19:01:52 1.35MB 5G生态 网络信任