CN114331182A - Risk assessment method and system for public security high-risk personnel - Google Patents

Risk assessment method and system for public security high-risk personnel Download PDF

Info

Publication number
CN114331182A
CN114331182A CN202111674198.8A CN202111674198A CN114331182A CN 114331182 A CN114331182 A CN 114331182A CN 202111674198 A CN202111674198 A CN 202111674198A CN 114331182 A CN114331182 A CN 114331182A
Authority
CN
China
Prior art keywords
risk
personnel
public security
data information
personal data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111674198.8A
Other languages
Chinese (zh)
Inventor
蒋知义
鄢喜爱
骆健儿
高凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiangtan University
Hunan Police Academy
Original Assignee
Xiangtan University
Hunan Police Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiangtan University, Hunan Police Academy filed Critical Xiangtan University
Priority to CN202111674198.8A priority Critical patent/CN114331182A/en
Publication of CN114331182A publication Critical patent/CN114331182A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a system for risk assessment of public security high-risk personnel, which relate to the technical field of public security state assessment and comprise the following steps: acquiring personal data information of security and high-risk personnel; preprocessing personal data information to obtain risk indexes, comparing the risk indexes pairwise and constructing a judgment matrix; calculating the characteristic value of the judgment matrix, and obtaining the risk assessment weight value of each index; establishing a risk assessment model according to the risk assessment weight value, and performing risk scoring on the security high-risk personnel by using the risk assessment model; obtaining a risk evaluation result according to the risk score; according to the risk assessment method for the public security high-risk personnel, early warning and analysis are performed on risks which the public security high-risk personnel may encounter in the public security process, related measures are provided according to early warning and analysis results for protection, social risks are reduced, and safety of the public security high-risk personnel is effectively guaranteed.

Description

Risk assessment method and system for public security high-risk personnel
Technical Field
The invention relates to the technical field of public security state evaluation, in particular to a method and a system for evaluating risks of public security high-risk personnel.
Background
With the continuous deepening of the urbanization process and the continuous development and application of new technologies, the urban public security state is also influenced by more factors, and the social public security state evaluation becomes an important basis and means for the overall prevention and control of urban public security.
At present, social management and control are taken as important management and control directions in the field of public security, and the value of big data can be fully utilized in social security state evaluation. In the public security process of the current society, great social risks are often accompanied, and no effective method in the existing assessment method can perform early warning and analysis on the risks possibly encountered by the public security high-risk personnel in the social security process, so that the safety of the public security high-risk personnel cannot be guaranteed, and therefore, a risk assessment method is needed for performing risk safety assessment on the public security high-risk personnel.
Disclosure of Invention
The invention aims to provide a method and a system for risk assessment of public security high-risk personnel, which can carry out risk assessment on the social security high-risk personnel.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides a risk assessment method for public security high-risk personnel, which includes the following steps:
step one, acquiring personal data information of security and high-risk personnel;
secondly, preprocessing the personal data information to obtain a risk index;
step three, comparing the risk indexes pairwise and constructing a judgment matrix;
calculating the characteristic value of the judgment matrix, and obtaining the risk assessment weight value of each index;
establishing a risk assessment model according to the risk assessment weight value, and performing risk scoring on the security high-risk personnel by using the risk assessment model;
and step six, acquiring a risk evaluation result according to the risk score.
In some embodiments of the present invention, the risk indicators include visual indicators, disturbance indicators, police resource indicators, social indicators, and subjective indicators.
In some embodiments of the present invention, the first step further includes: and performing characteristic processing on the personal data information, and adding new personal characteristic data.
In some embodiments of the present invention, step two is prior to the pre-treating, the method further comprising: and determining the data type of each data in the personal data information, and preprocessing the personal data information according to the data type.
In some embodiments of the present invention, the pre-treatment in step two comprises: and carrying out Gaussian distribution processing and/or coding processing on the personal data information according to the data type.
In some embodiments of the present invention, the step six further includes: and generating a risk assessment report according to the risk assessment result.
In some embodiments of the present invention, the personal data information includes: basic information data, medical data, and social security data
In a second aspect, an embodiment of the present application provides a risk assessment system for high-risk security personnel, which includes:
the data acquisition module is used for acquiring personal data information of security and high-risk personnel;
the preprocessing module is used for preprocessing the personal data information to obtain a risk index;
the risk judgment module is used for comparing the risk indexes pairwise and constructing a judgment matrix;
the characteristic extraction module is used for calculating the characteristic value of the judgment matrix and obtaining the risk evaluation weight value of each index;
the risk evaluation module is used for establishing a risk evaluation model according to the risk evaluation weight value and carrying out risk scoring on the security high-risk personnel by using the risk evaluation model;
and the evaluation processing module is used for obtaining a risk evaluation result according to the risk score.
In a third aspect, an embodiment of the present application provides an electronic device, which includes:
a memory for storing one or more programs;
a processor;
the above one or more programs, when executed by the above processor, implement the method of the above first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, where the computer program is executed by a processor to implement the method according to the first aspect.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the embodiment of the invention provides a risk assessment method for public security high-risk personnel, which comprises the following steps: step one, acquiring personal data information of security and high-risk personnel; secondly, preprocessing the personal data information to obtain a risk index; step three, comparing the risk indexes pairwise and constructing a judgment matrix; calculating the characteristic value of the judgment matrix, and obtaining the risk assessment weight value of each index; establishing a risk assessment model according to the risk assessment weight value, and performing risk scoring on the security high-risk personnel by using the risk assessment model; and step six, acquiring a risk evaluation result according to the risk score.
The risk assessment method for the public security high-risk personnel mainly comprises the steps of obtaining risk indexes of the public security high-risk personnel, obtaining risk assessment results of each person after the risk indexes are processed, fully utilizing the value of big data, early warning and analyzing risks which the public security high-risk personnel may encounter in the public security process, providing relevant measures according to the early warning and the analysis results to protect, reducing social risks, and effectively guaranteeing the safety of the public security high-risk personnel.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a step chart of a risk assessment method for public security high-risk personnel in embodiment 1 of the present invention;
fig. 2 is a schematic structural block diagram of a risk assessment system for public security high-risk personnel in embodiment 2 of the present invention;
fig. 3 is a schematic structural block diagram of an electronic device according to an embodiment of the present invention.
Icon: 101. a memory; 102. a processor; 103. a communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It should be noted that, in this document, the term "comprises/comprising" or any other variation thereof is intended to cover a non-exclusive inclusion, so that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a step diagram illustrating a risk assessment method for a public security high-risk person according to embodiment 1 of the present application.
Embodiment 1 of the present application provides a risk assessment method for public security high-risk personnel, which includes the following steps:
step one, acquiring personal data information of security and high-risk personnel;
secondly, preprocessing the personal data information to obtain a risk index; after the information is processed, a plurality of risk indexes are obtained based on historical training data, wherein the risk indexes comprise visual indexes, disturbance indexes, police resource indexes, social indexes and subjective indexes.
Step three, comparing the risk indexes pairwise and constructing a judgment matrix; and comparing the visual index, the disturbance index, the police resource index, the social index and the subjective index pairwise to obtain a judgment matrix.
Calculating the characteristic value of the judgment matrix, and obtaining the risk assessment weight value of each index;
establishing a risk assessment model according to the risk assessment weight value, and performing risk scoring on the security high-risk personnel by using the risk assessment model; and adding the weighted values of the risk assessment to obtain a total risk score, wherein the more the risk score is, the higher the risk level is.
And step six, acquiring a risk evaluation result according to the risk score.
It should be noted that, the process of constructing the determination matrix in step three is as follows: comparing all risk indexes pairwise with each other, and reducing the difficulty of comparing different factors with each other by using the relative scale adopted in the process as much as possible so as to improve the comparison accuracy, namely comparing every two risk indexes to form a judgment matrix of each index. For example, assuming that there are 5 risk indicators A, B, C, D and E, a and B are combined into one decision matrix, B and C are combined into one decision matrix, C and D are combined into one decision matrix, D and E are combined into one decision matrix, and E and a are combined into one decision matrix, so that two by two are combined into 5 decision matrices.
In the fourth step, the characteristic value of the judgment matrix is calculated, and the process of obtaining the risk assessment weight value of each index is as follows: and solving the characteristic root of each judgment matrix in the third step, taking the characteristic root corresponding to each risk index as a risk assessment weighted value of the corresponding risk index, and providing a data basis for establishing a risk assessment model according to the risk assessment weighted value.
As a preferred implementation, the risk indicators include visual indicators, disturbance indicators, police resource indicators, social indicators, and subjective indicators.
As a preferred embodiment, the first step further comprises: and performing characteristic processing on the personal data information, and adding new personal characteristic data.
The characteristic processing process of the personal data information comprises the following steps: the method comprises the steps of calculating pearson correlation coefficients of all personal data information, and extracting data with weak correlation or completely irrelevant correlation after comparison to serve as feature data. In the calculation process, the larger the absolute value of the correlation coefficient is, the stronger the correlation is, the closer the correlation coefficient is to 1 or-1, the stronger the correlation is, the closer the correlation coefficient is to 0, and the weaker the correlation is. For example, the correlation strength of a variable is usually judged by the following value ranges: the correlation coefficient is 0.8-1.0, namely the strong correlation is realized; 0.6-0.8, i.e. strongly correlated; 0.4-0.6, moderately relevant; 0.2-0.4, i.e. weakly correlated; 0.0-0.2, i.e., very weakly correlated or uncorrelated.
As a preferred embodiment, step two is before the pretreatment, the method further comprising: and determining the data type of each data in the personal data information, and preprocessing the personal data information according to the data type.
Note that the data type of each data in the personal data information includes continuous data and discrete data.
As a preferred embodiment, the pretreatment in step two comprises: and carrying out Gaussian distribution processing and/or coding processing on the personal data information according to the data type.
Specifically, Gaussian distribution processing is performed on personal data information of which the data type is continuous data, and centralized statistical processing is performed on the continuous personal data information, so that subsequent centralized processing is facilitated, and the accuracy and the efficiency of data processing are improved; the data format can be kept consistent after the personal data information of which the data type is discrete data is coded, so that the personal data information can be identified by a subsequent model.
As a preferred embodiment, step six further includes: and generating a risk assessment report according to the risk assessment result.
Therefore, after a risk evaluation result is obtained through risk scoring, a risk evaluation report is generated according to the risk evaluation result, analysis can be carried out according to the risk evaluation report, and the risk level of a risk index is judged, so that the emergency risk condition can be estimated, preparation of emergency conditions is carried out according to different emergency risk conditions, preparation required under the condition of major emergency accidents is discussed, risk emergency measures are made, accidents which are not considered but occur are recorded, preparation is carried out on emergency articles, prevention of new emergency risks is guaranteed, prevention and control of different conditions are carried out to different degrees, the overall good prevention and control effect is guaranteed, the casualty rate of personnel when the risks come is effectively reduced, and the overall good prevention and control effect is improved.
As a preferred embodiment, the personal data information includes: basic information data, medical data, and social security data.
The personal data information of each public security high-risk personnel is processed to obtain the prediction of each public security high-risk personnel on various risk conditions during the processing of the risk accident, the early warning is carried out on the possible occurrence conditions, further, the appropriate personnel selection can be dispatched according to the accident, and the early warning and the preparation are carried out on the possible occurrence risk conditions as far as possible.
Example 2
Referring to fig. 2, fig. 2 is a schematic structural block diagram of a risk assessment system for public security high-risk personnel according to embodiment 2 of the present application.
Embodiment 2 of the present application provides a public security high risk personnel risk assessment system, it includes:
the data acquisition module is used for acquiring personal data information of security and high-risk personnel;
the preprocessing module is used for preprocessing the personal data information to obtain a risk index;
the risk judgment module is used for comparing the risk indexes pairwise and constructing a judgment matrix;
the characteristic extraction module is used for calculating the characteristic value of the judgment matrix and obtaining the risk evaluation weight value of each index;
the risk evaluation module is used for establishing a risk evaluation model according to the risk evaluation weight value and carrying out risk scoring on the security high-risk personnel by using the risk evaluation model;
and the evaluation processing module is used for obtaining a risk evaluation result according to the risk score.
Embodiment 2 of the present application provides a risk assessment system for public security high-risk personnel, which includes obtaining personal data information of the public security high-risk personnel through a data obtaining module, wherein the personal data information includes basic information data, medical data, social security data and the like of each public security high-risk personnel, preprocessing the personal data information of each public security high-risk personnel through a preprocessing module, thereby obtaining a risk index of each public security high-risk personnel, comparing every two risk indexes of all persons through a risk judging module, constructing a judging matrix, calculating a characteristic value of the judging matrix by using a characteristic extracting module, thereby obtaining a risk assessment weighted value of each index of each public security high-risk personnel, further establishing a risk assessment model according to the risk assessment weighted values of all the public security high-risk personnel through the risk assessment module, and performing risk scoring on each public security high-risk personnel by using the risk assessment model, finally, the risk evaluation result of each high-risk security personnel can be obtained by utilizing the risk score of each high-risk security personnel, a risk evaluation report can be generated through the evaluation result, analysis can be carried out according to the risk evaluation report, the risk grade of a risk index is judged, the emergency risk condition can be estimated, the preparation of emergency conditions is carried out according to different emergency risk conditions, the preparation required in the case of major emergency accidents is discussed, the risk emergency measures are made, the accidents which are not considered but occur are recorded, the preparation is carried out corresponding to emergency articles, the prevention of new emergency risks is ensured, the prevention and the control of different conditions are carried out to different degrees, the good prevention and control effect of the whole body is ensured, the casualty rate of the personnel at the moment of the arrival of the risk is effectively reduced, the good prevention effect of the whole body is increased, and the early warning is carried out on the possible conditions, and further, appropriate people can be dispatched according to the accident, and early warning and preparation can be made as far as possible for the possible risk condition.
Example 3
Referring to fig. 3, fig. 3 is a schematic structural block diagram of an electronic device according to embodiment 3 of the present application.
Embodiment 3 of the present application provides an electronic device, which includes a memory 101, a processor 102, and a communication interface 103, where the memory 101, the processor 102, and the communication interface 103 are electrically connected to each other directly or indirectly to implement data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It is to be understood that the configurations shown in the figures are merely exemplary and that a method and system for risk assessment of a peace high risk individual may include more or fewer components than shown or may have a different configuration than shown. The components shown in the figures may be implemented in hardware, software, or a combination thereof.
In the embodiments provided in the present application, it should be understood that the disclosed system or method may be implemented in other ways. The embodiments described above are merely illustrative, and the flowcharts and block diagrams in the figures, for example, illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
To sum up, according to the method and the system for risk assessment of public security high-risk personnel provided by the embodiment of the application, personal data of the public security high-risk personnel are processed to obtain risk indexes of the public security high-risk personnel, the judgment matrix is constructed through the risk indexes to extract the characteristic values, so that the risk assessment weighted values of the risk indexes of each public security high-risk personnel are obtained, a risk assessment model is established to perform risk scoring for each personnel, the risk assessment results of each person can be obtained according to the risk scoring, the value of the alarm condition big data can be fully utilized, risks which may be met by the public security high-risk personnel in the public security process are pre-warned and analyzed, related measures are provided according to the pre-warned and analyzed results to perform protection, social risks are reduced, and the safety of the public security high-risk personnel is effectively guaranteed.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A risk assessment method for public security high-risk personnel is characterized by comprising the following steps:
step one, acquiring personal data information of security and high-risk personnel;
secondly, preprocessing the personal data information to obtain a risk index;
step three, comparing the risk indexes pairwise and constructing a judgment matrix;
calculating the characteristic value of the judgment matrix, and obtaining the risk assessment weight value of each index;
establishing a risk assessment model according to the risk assessment weight value, and performing risk scoring on the security high-risk personnel by using the risk assessment model;
and step six, acquiring a risk evaluation result according to the risk score.
2. The risk assessment method for public security high-risk personnel according to claim 1, wherein the risk indicators include visual indicators, disturbance indicators, police resource indicators, social indicators and subjective indicators.
3. The method for assessing the risk of a public security high risk person of claim 1, wherein the step one further comprises: and performing characteristic processing on the personal data information, and adding new personal characteristic data.
4. The method for assessing the risk of a public security high risk person of claim 1, wherein step two is performed before the preprocessing, the method further comprising: and determining the data type of each data in the personal data information, and preprocessing the personal data information according to the data type.
5. The risk assessment method for high-risk security personnel according to claim 4, wherein the preprocessing in the second step comprises: and carrying out Gaussian distribution processing and/or coding processing on the personal data information according to the data type.
6. The risk assessment method for high-risk security personnel according to claim 1, wherein the sixth step further comprises: and generating a risk assessment report according to the risk assessment result.
7. The method as claimed in claim 1, wherein the personal data information includes: basic information data, medical data, and social security data.
8. The utility model provides a public security high risk personnel risk assessment system which characterized in that includes:
the data acquisition module is used for acquiring personal data information of security and high-risk personnel;
the preprocessing module is used for preprocessing the personal data information to obtain a risk index;
the risk judgment module is used for comparing the risk indexes pairwise and constructing a judgment matrix;
the characteristic extraction module is used for calculating the characteristic value of the judgment matrix and obtaining the risk evaluation weight value of each index;
the risk evaluation module is used for establishing a risk evaluation model according to the risk evaluation weight value and carrying out risk scoring on the security high-risk personnel by using the risk evaluation model;
and the evaluation processing module is used for obtaining a risk evaluation result according to the risk score.
9. An electronic device, comprising:
a memory for storing one or more programs;
a processor;
the one or more programs, when executed by the processor, implement the method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202111674198.8A 2021-12-31 2021-12-31 Risk assessment method and system for public security high-risk personnel Pending CN114331182A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111674198.8A CN114331182A (en) 2021-12-31 2021-12-31 Risk assessment method and system for public security high-risk personnel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111674198.8A CN114331182A (en) 2021-12-31 2021-12-31 Risk assessment method and system for public security high-risk personnel

Publications (1)

Publication Number Publication Date
CN114331182A true CN114331182A (en) 2022-04-12

Family

ID=81021522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111674198.8A Pending CN114331182A (en) 2021-12-31 2021-12-31 Risk assessment method and system for public security high-risk personnel

Country Status (1)

Country Link
CN (1) CN114331182A (en)

Similar Documents

Publication Publication Date Title
Lin et al. Using machine learning to assist crime prevention
CN108320256A (en) Social security events recognition methods, equipment and storage medium based on big data
CN109656793A (en) A kind of information system performance stereoscopic monitoring method based on multi-source heterogeneous data fusion
CN110222525A (en) Database manipulation auditing method, device, electronic equipment and storage medium
CN110134566A (en) Information system performance monitoring method under a kind of cloud environment based on label technique
CN112422351B (en) Network alarm prediction model establishing method and device based on deep learning
CN108494806A (en) Cyberthreat warning monitoring system based on artificial intelligence
CN112288192A (en) Environment-friendly monitoring and early warning method and system
CN109767351A (en) A kind of security postures cognitive method of power information system daily record data
US10725850B2 (en) Estimating risk to a computer network from a high risk failure that occurred on a first or second computer system
CN112039903A (en) Network security situation assessment method based on deep self-coding neural network model
Agarwal et al. Comparison of machine learning approaches in the prediction of terrorist attacks
CN115296933B (en) Industrial production data risk level assessment method and system
CN114118576A (en) Regional geological disaster trend prediction method and system
CN112738088A (en) Behavior sequence anomaly detection method and system based on unsupervised algorithm
CN115222303B (en) Industry risk data analysis method and system based on big data and storage medium
CN113472754A (en) Security protection configuration method based on network security big data and network security system
CN116090819A (en) Power distribution network risk situation prediction method based on association rule
CN114885334A (en) High-concurrency short message processing method
CN114331182A (en) Risk assessment method and system for public security high-risk personnel
CN113469247A (en) Network asset abnormity detection method
CN110322049B (en) Public security big data early warning method
CN115277159B (en) Industrial Internet security situation assessment method based on improved random forest
CN112288117A (en) Target customer deal probability prediction method and device and electronic equipment
CN115987594A (en) Abnormity detection method, device and equipment for network security log

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination