CN112632040A - Method, device and equipment for generating nuclear security event library and computer storage medium - Google Patents

Method, device and equipment for generating nuclear security event library and computer storage medium Download PDF

Info

Publication number
CN112632040A
CN112632040A CN202011635259.5A CN202011635259A CN112632040A CN 112632040 A CN112632040 A CN 112632040A CN 202011635259 A CN202011635259 A CN 202011635259A CN 112632040 A CN112632040 A CN 112632040A
Authority
CN
China
Prior art keywords
security event
nuclear
nuclear security
array
library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011635259.5A
Other languages
Chinese (zh)
Inventor
杨丽芳
韩叶良
杨志民
武朝辉
杨长杰
赵泽雨
高雪梅
张继龙
黎春
王岚
王烁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Nuclear Security Technology Center
Original Assignee
State Nuclear Security Technology Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Nuclear Security Technology Center filed Critical State Nuclear Security Technology Center
Priority to CN202011635259.5A priority Critical patent/CN112632040A/en
Publication of CN112632040A publication Critical patent/CN112632040A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method, a device and equipment for generating a nuclear security event library and a computer storage medium. The generation method of the nuclear security event library comprises the following steps: acquiring element information of a nuclear security event chain; constructing a nuclear security event chain by using the key element information of the nuclear security event chain; and based on the nuclear security event chain, performing array calculation by using a preset target element array to generate a nuclear security event library. According to the embodiment of the application, the nuclear security event library can be automatically generated.

Description

Method, device and equipment for generating nuclear security event library and computer storage medium
Technical Field
The application belongs to the technical field of generation of a nuclear security event library, and particularly relates to a method and a device for generating the nuclear security event library, electronic equipment and a computer storage medium.
Background
At present, the nuclear security event has no automatic generation technology of an event library. Generally, according to expert experience, some more probable events are manually compiled to form a limited event database. And the limited event database has strong dependency on experts.
Therefore, how to automatically generate the kernel security event library is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides a method and a device for generating a nuclear security event library, electronic equipment and a computer storage medium, which can automatically generate the nuclear security event library.
In a first aspect, an embodiment of the present application provides a method for generating a nuclear security event library, including:
acquiring element information of a nuclear security event chain;
constructing a nuclear security event chain by using the key element information of the nuclear security event chain;
and based on the nuclear security event chain, performing array calculation by using a preset target element array to generate a nuclear security event library.
Optionally, the core security event chain element information includes at least one of a threat source, an attack target, a protection means, and an activity implementation and outcome analysis.
Optionally, the threat source includes at least one of a nuclear technology utilization unit, a nuclear facility, a nuclear material transportation lane, and an illegal sale.
Optionally, the attack target is a position satisfying a preset condition.
Optionally, the outcome analysis includes at least one of radiological, psychological, economic, political, and destructive outcomes.
Optionally, the target element array includes at least one of a construction intention array, a threat array, a protection array, an adversary ability array, and a transfer mode array.
In a second aspect, an embodiment of the present application provides a device for generating a nuclear security event library, including:
the acquisition module is used for acquiring the key element information of the nuclear security event chain;
the building module is used for building a nuclear security event chain by utilizing the nuclear security event chain element information;
and the calculation module is used for performing array calculation by using a preset target element array based on the nuclear security event chain to generate a nuclear security event library.
Optionally, the core security event chain element information includes at least one of a threat source, an attack target, a protection means, and an activity implementation and outcome analysis.
Optionally, the threat source includes at least one of a nuclear technology utilization unit, a nuclear facility, a nuclear material transportation lane, and an illegal sale.
Optionally, the attack target is a position satisfying a preset condition.
Optionally, the outcome analysis includes at least one of radiological, psychological, economic, political, and destructive outcomes.
Optionally, the target element array includes at least one of a construction intention array, a threat array, a protection array, an adversary ability array, and a transfer mode array.
In a third aspect, an embodiment of the present application provides an electronic device, where the electronic device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the method for generating a nuclear security event library as shown in the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, where computer program instructions are stored on the computer storage medium, and when the computer program instructions are executed by a processor, the method for generating a nuclear security event library according to the first aspect is implemented.
The method, the device, the electronic equipment and the computer storage medium for generating the nuclear security event library can automatically generate the nuclear security event library. The method for generating the nuclear security event library acquires the key element information of the nuclear security event chain; constructing a nuclear security event chain by using the key element information of the nuclear security event chain; and based on the nuclear security event chain, performing array calculation by using a preset target element array to generate a nuclear security event library. Therefore, the method can automatically generate the nuclear security event library and get rid of the dependence on experts.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for generating a nuclear security event library according to an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a preliminary decomposition of an event chain element according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating threat elements of a nuclear security event provided by an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating target elements of a nuclear security event provided by an embodiment of the present application;
FIG. 5 is a schematic diagram of nuclear security event protection elements provided by an embodiment of the present application;
FIG. 6 is a schematic diagram illustrating an implementation element of a nuclear security event provided by an embodiment of the present application;
FIG. 7 is a diagram illustrating the consequences of a nuclear security event provided by an embodiment of the present application;
FIG. 8 is a diagram illustrating generation of a scenario event library for a nuclear security event according to an embodiment of the present application;
FIG. 9 is a schematic view of a chain of radioactive dissemination scenario events provided by one embodiment of the present application;
FIG. 10 is a schematic diagram of an attack core facility scenario event chain according to an embodiment of the present application;
FIG. 11 is a simplified nuclear explosion scenario event chain diagram provided by an embodiment of the present application;
fig. 12 is a schematic structural diagram of a core security event library generating apparatus according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In order to solve the prior art problems, embodiments of the present application provide a method, an apparatus, a device, and a computer storage medium for generating a nuclear security event library. First, a method for generating a nuclear security event library provided in the embodiment of the present application is described below.
Fig. 1 shows a flowchart of a method for generating a nuclear security event library according to an embodiment of the present application. As shown in fig. 1, the method for generating the nuclear security event library includes:
s101, acquiring element information of a nuclear security event chain.
And S102, constructing a nuclear security event chain by utilizing the nuclear security event chain element information.
In one embodiment, the nuclear security event chain element information comprises at least one of a threat source, an attack target, a safeguard, and an activity implementation and outcome analysis. Researching the occurrence rule of a typical nuclear security event, and performing preliminary decomposition on event chain elements, as shown in fig. 2, including threat sources, attack targets, protection means, activity implementation and consequence analysis.
In one embodiment, the source of threat includes at least one of nuclear technology utilization units, nuclear facilities, nuclear material transportation lines, and illegal sales. The main threat source consists of 4 parts, as shown in fig. 3, and steals radioactive substances for nuclear technology utilization units; attacking fixed facilities, stealing weapons-grade materials for nuclear facilities; attacking mobile facilities for a special nuclear material transportation line; and acquiring other radioactive substances and weapon-grade materials aiming at illegal sales.
In one embodiment, the attack target is a location that satisfies a preset condition. The purpose is different, and the selected attack targets are different. The attack targets are classified into cases according to the attack purpose, and as shown in fig. 4, the attack targets may be fixed locations and sites having political significance, fixed locations and sites having economic influence, or fixed locations and sites having dense personnel, for example, transportation junctions, and dense personnel.
In one embodiment, the protection means comprises three parts, 6 types, as shown in fig. 5, which are a nuclear technology utilizing a unit physical protection system, a nuclear facility physical protection system, an in-transit physical protection system, an attacked object radiation detection system, a radiation detection system deployed in a traffic road, and a radiation detection system deployed in a customs port, respectively.
In one embodiment, the implementation of the activity, which consists essentially of three parts of content, as shown in FIG. 6, includes resolution, personnel ability, and tactical policies.
In one embodiment, the outcome analysis includes at least one of radiological, psychological, economic, political, and destructive outcomes. As shown in fig. 7, the radiological consequences include personnel, ecological radiological consequences; economic consequences include direct and indirect economic consequences; political consequences include domestic and international political consequences; the destructive consequences include the scenario of a simple nuclear explosive device involving casualties, environmental facilities.
S103, based on the nuclear security event chain, array calculation is carried out by utilizing a preset target element array, and a nuclear security event library is generated.
In one embodiment, the target element array includes at least one of a build intent array, a threat array, a protection array, an adversary ability array, a diversion style array.
Wherein, constructing an intention array C1 ═ political influence, economic influence, social influence };
threat array C2 ═ radioactive source, nuclear facility, WG nuclear facility, line of transportation, illegal sale };
protection array C3 ═ protection measure 1, protection measure 2, … …, protection measure m, };
enemy ability array C4 ═ type, number of people, level of education, tool, attack mode, … …, };
the transportation mode array C5 ═ car, train, airplane, ship, … …, };
…………………………………………;
the array Cn ═ Cn1, Cn2, … …, Cnl }.
The method comprises the steps of constructing 11 databases, namely a radioactive source database (a nuclear technology utilization unit database), a nuclear facility database, a WG (WG) material database, a sensitive landmark database, a special transportation line database, a boundary port database, an enemy database, a protective measure database, an attack mode database, a transportation mode database and a protective measure database.
The occurrence of the security event is triggered manually and is dominated by a human. The basis for the occurrence of an event is the objective presence of radioactive materials, nuclear facilities, etc. Therefore, as shown in fig. 8, the event library for the typical scenario of the nuclear security event is generated, and after the set of people-related objects is triggered, a threat source set is obtained, and finally an event consequence set is obtained. And utilizing a computer to gradually select from the key element arrays according to the formed event chain, namely performing array calculation to form an event library based on the database.
By utilizing the invention, the dependence on expert experience can be overcome to a certain extent. After the event library is generated, the single event can be directly referred to without manual judgment.
The mechanism of occurrence of the radioactive distribution event is analyzed, and the event elements of the scenario are decomposed, as shown in fig. 9. The mechanism of occurrence of the event attacking the core facility is analyzed, and the event elements of the scenario are decomposed, as shown in fig. 10. The mechanism of occurrence of the simple nuclear explosion event is analyzed, and event elements of the scenario are decomposed, as shown in fig. 11.
As shown in fig. 12, an embodiment of the present application further provides a nuclear security event library generating apparatus, including:
an obtaining module 1201, configured to obtain core security event chain element information;
a building module 1202, configured to build a core security event chain by using the core security event chain element information;
the calculating module 1203 is configured to perform array calculation by using a preset target element array based on the core security event chain, and generate a core security event library.
In one embodiment, the nuclear security event chain element information comprises at least one of a threat source, an attack target, a safeguard, and an activity implementation and outcome analysis.
In one embodiment, the source of threat includes at least one of nuclear technology utilization units, nuclear facilities, nuclear material transportation lines, and illegal sales.
In one embodiment, the attack target is a location that satisfies a preset condition.
In one embodiment, the outcome analysis includes at least one of radiological, psychological, economic, political, and destructive outcomes.
In one embodiment, the target element array includes at least one of a build intent array, a threat array, a protection array, an adversary ability array, a diversion style array.
Each module/unit in the apparatus shown in fig. 12 has a function of implementing each step in fig. 1, and can achieve the corresponding technical effect, and for brevity, no further description is provided here.
Fig. 13 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
The electronic device may include a processor 1301 and a memory 1302 storing computer program instructions.
Specifically, the processor 1301 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 1302 may include mass storage for data or instructions. By way of example, and not limitation, memory 1302 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 1302 may include removable or non-removable (or fixed) media, where appropriate. Memory 1302 may be internal or external to the electronic device, where appropriate. In a particular embodiment, the memory 1302 may be non-volatile solid-state memory.
In one example, Memory 1302 may be a Read Only Memory (ROM). In one example, the ROM may be mask programmed ROM, programmable ROM (prom), erasable prom (eprom), electrically erasable prom (eeprom), electrically rewritable ROM (earom), or flash memory, or a combination of two or more of these.
The processor 1301 may implement any one of the above-described methods for generating a security event library by reading and executing computer program instructions stored in the memory 1302.
In one example, the electronic device may also include a communication interface 1303 and a bus 1310. As shown in fig. 13, the processor 1301, the memory 1302, and the communication interface 1303 are connected to each other via a bus 1310 to complete communication therebetween.
The communication interface 1303 is mainly used to implement communication between modules, apparatuses, units and/or devices in this embodiment of the application.
Bus 1310 includes hardware, software, or both to couple the components of the online data traffic billing device to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 1310 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
In addition, the embodiment of the application can be realized by providing a computer storage medium. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any one of the above-described embodiments of the method for generating a nuclear security event library.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (10)

1. A generation method of a nuclear security event library is characterized by comprising the following steps:
acquiring element information of a nuclear security event chain;
constructing a nuclear security event chain by using the nuclear security event chain element information;
and based on the nuclear security event chain, performing array calculation by using a preset target element array to generate a nuclear security event library.
2. The nuclear security event repository generating method of claim 1, wherein the nuclear security event chain element information includes at least one of threat sources, attack targets, protection measures, and activity enforcement and outcome analysis.
3. The nuclear security event repository generating method of claim 2, wherein the threat sources include at least one of nuclear technology utilization units, nuclear facilities, nuclear material transportation lines, and illegal sales.
4. The nuclear security event library generation method of claim 2, wherein the attack target is a location that meets a preset condition.
5. The nuclear security event library generation method of claim 2, wherein the outcome analysis includes at least one of radiological, psychological, economic, political and destructive outcomes.
6. The nuclear security event library generation method of claim 1, wherein the array of target elements comprises at least one of a build intent array, a threat array, a protection array, an adversary ability array, and a transit mode array.
7. A nuclear security event library generating apparatus, comprising:
the acquisition module is used for acquiring the key element information of the nuclear security event chain;
the construction module is used for constructing a nuclear security event chain by utilizing the nuclear security event chain element information;
and the calculation module is used for performing array calculation by using a preset target element array based on the nuclear security event chain to generate a nuclear security event library.
8. The nuclear security event repository generating device of claim 7, wherein the nuclear security event chain element information comprises at least one of a threat source, an attack target, a safeguard approach, and an activity implementation and outcome analysis.
9. An electronic device, characterized in that the electronic device comprises: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the nuclear security event repository generation method of any of claims 1-6.
10. A computer storage medium having computer program instructions stored thereon, which when executed by a processor, implement the nuclear security event library generation method of any one of claims 1 to 6.
CN202011635259.5A 2020-12-31 2020-12-31 Method, device and equipment for generating nuclear security event library and computer storage medium Pending CN112632040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011635259.5A CN112632040A (en) 2020-12-31 2020-12-31 Method, device and equipment for generating nuclear security event library and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011635259.5A CN112632040A (en) 2020-12-31 2020-12-31 Method, device and equipment for generating nuclear security event library and computer storage medium

Publications (1)

Publication Number Publication Date
CN112632040A true CN112632040A (en) 2021-04-09

Family

ID=75290374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011635259.5A Pending CN112632040A (en) 2020-12-31 2020-12-31 Method, device and equipment for generating nuclear security event library and computer storage medium

Country Status (1)

Country Link
CN (1) CN112632040A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108480A (en) * 2018-01-04 2018-06-01 华北电力科学研究院有限责任公司 The newer method of dynamic and system of electric power trade information safety education equipment
US10122748B1 (en) * 2015-08-21 2018-11-06 InsCyt, LLC Network protection system and threat correlation engine
CN109033200A (en) * 2018-06-29 2018-12-18 北京百度网讯科技有限公司 Method, apparatus, equipment and the computer-readable medium of event extraction
CN109344170A (en) * 2018-09-04 2019-02-15 阿里巴巴集团控股有限公司 Stream data processing method, system, electronic equipment and readable storage medium storing program for executing
CN110309296A (en) * 2018-03-09 2019-10-08 北京国双科技有限公司 A kind of Event Distillation method and device
CN110348578A (en) * 2019-07-04 2019-10-18 北京仿真中心 A kind of security incident scene deduces construction method, system, equipment and medium
CN110737821A (en) * 2018-07-03 2020-01-31 百度在线网络技术(北京)有限公司 Similar event query method, device, storage medium and terminal equipment
CN112153002A (en) * 2020-08-24 2020-12-29 杭州安恒信息技术股份有限公司 Alarm information analysis method and device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10122748B1 (en) * 2015-08-21 2018-11-06 InsCyt, LLC Network protection system and threat correlation engine
CN108108480A (en) * 2018-01-04 2018-06-01 华北电力科学研究院有限责任公司 The newer method of dynamic and system of electric power trade information safety education equipment
CN110309296A (en) * 2018-03-09 2019-10-08 北京国双科技有限公司 A kind of Event Distillation method and device
CN109033200A (en) * 2018-06-29 2018-12-18 北京百度网讯科技有限公司 Method, apparatus, equipment and the computer-readable medium of event extraction
CN110737821A (en) * 2018-07-03 2020-01-31 百度在线网络技术(北京)有限公司 Similar event query method, device, storage medium and terminal equipment
CN109344170A (en) * 2018-09-04 2019-02-15 阿里巴巴集团控股有限公司 Stream data processing method, system, electronic equipment and readable storage medium storing program for executing
CN110348578A (en) * 2019-07-04 2019-10-18 北京仿真中心 A kind of security incident scene deduces construction method, system, equipment and medium
CN112153002A (en) * 2020-08-24 2020-12-29 杭州安恒信息技术股份有限公司 Alarm information analysis method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Sheehan et al. Connected and autonomous vehicles: A cyber-risk classification framework
CN111815986B (en) Traffic accident early warning method and device, terminal equipment and storage medium
Giuffrida Liability for AI decision-making: some legal and ethical considerations
US10783600B2 (en) Method and system using a blockchain database for data exchange between vehicles and entities
Kerimov et al. Evaluation of functional efficiency of automated traffic enforcement systems
Baird et al. An overview of waste crime, its characteristics, and the vulnerability of the EU waste sector
CN107358158B (en) Group partner plan early warning method and device
Ma et al. Causation analysis of hazardous material road transportation accidents by bayesian network using genie
Muhammad et al. Emerging cybersecurity and privacy threats to electric vehicles and their impact on human and environmental sustainability
Shah et al. IOT based smart bus system
CN112632040A (en) Method, device and equipment for generating nuclear security event library and computer storage medium
Iqbal et al. Legal and ethical implications of GPS vulnerabilities
CN112633765A (en) Method, device, equipment and storage medium for nuclear security risk assessment
Trofimov et al. Regulation modelling and analysis using machine learning during the Covid-19 pandemic in Russia
RU2002105932A (en) Method for designing an integrated security system for an object
Wu et al. Changes in novice motorcyclist safety in Hong Kong after the probationary driving license scheme
US20220141235A1 (en) Automatic hotspot identification in network graphs
Bielefeld Mexico’s stolen radiation source: It could happen here
Salnyk et al. Stochastic model of the reaction the unattended ground sensor system based on {3+ 3} scheme
CN112597490A (en) Security threat arrangement response method and device, electronic equipment and readable storage medium
Pope A hazard analysis technique for the internet of things (IoT) and mobile
Proma et al. Systematic situation coverage versus random situation coverage for safety testing in an autonomous car simulation
Lega et al. GIS and IR aerial view: advanced tools for the early detection of environmental violations
Van den Eijnden et al. The first mm detection of a neutron star high-mass X-ray binary
Yun et al. A Before‐and‐After Study of a Collision Risk Detecting and Warning System on Local Roads

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination