CN117688135B - Digital resource emergency management method and system - Google Patents

Digital resource emergency management method and system Download PDF

Info

Publication number
CN117688135B
CN117688135B CN202410123673.XA CN202410123673A CN117688135B CN 117688135 B CN117688135 B CN 117688135B CN 202410123673 A CN202410123673 A CN 202410123673A CN 117688135 B CN117688135 B CN 117688135B
Authority
CN
China
Prior art keywords
digital
emergency
digital resource
access
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410123673.XA
Other languages
Chinese (zh)
Other versions
CN117688135A (en
Inventor
郭德华
张明
李菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China National Institute of Standardization
Original Assignee
China National Institute of Standardization
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China National Institute of Standardization filed Critical China National Institute of Standardization
Priority to CN202410123673.XA priority Critical patent/CN117688135B/en
Publication of CN117688135A publication Critical patent/CN117688135A/en
Application granted granted Critical
Publication of CN117688135B publication Critical patent/CN117688135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a digital resource emergency management method and a system, wherein the method determines an emergency digital resource range and an accessible IP range based on event response; screening out corresponding digital files from the digital resource library according to the emergency digital resource range, judging the opening level of the digital files based on the sensitive information judging model, partitioning the data of the digital files according to the opening level, and storing the data into an emergency digital resource access platform database; detecting the network environment of an emergency digital resource access platform database in real time, determining a user accessible time window based on an environment risk coefficient, matching different access rights to users within an accessible IP range, opening corresponding data partitions based on the different access rights, monitoring the access behaviors of the users within the accessible time window, and generating a user access log. The method can effectively improve the emergency response speed of the digital resource and the disaster emergency management level.

Description

Digital resource emergency management method and system
Technical Field
The invention belongs to the technical field of resource emergency management, and particularly relates to a digital resource emergency management method and system.
Background
Digital resources refer to the sum of information resources which are distributed, accessed and utilized in a digital form, and the data information can be a multimedia file package formed by a plurality of files or a single file or database system. The digital resource has the advantages of small information storage space, difficult damage, long-term storage, convenient information review and retrieval, long-distance quick transmission, simultaneous use of the same information by multiple persons, and the like, so that the construction of a digital resource library and the sharing of the digital resource become research hotspots.
The digital resource emergency management is a test of the digital resource management level, and as a digital resource management department, the information requirement of a user needs to be accurately judged at the first time of occurrence of an event, and corresponding digital resource information is opened to support the smooth implementation of an emergency plan. In the prior art, CN116226908a discloses a data security emergency management analysis method and system based on big data, by classifying the target emergency management data, further performing privacy part processing on the confidential target emergency management data, and performing open group, access right and open time setting on the target emergency management data after processing, so as to realize targeted opening of the emergency management data.
Therefore, there is a need for a digital resource emergency management method and system, which can provide corresponding digital resources according to an emergency scheme when a disaster occurs.
Disclosure of Invention
The invention aims to provide a digital resource emergency management method and system, and the specific technical scheme is as follows:
in a first aspect, the present invention provides a digital resource emergency management method, the method comprising the steps of:
determining an emergency digital resource range and an accessible IP range based on the event response;
screening out corresponding digital files from a digital resource library according to the emergency digital resource range;
Judging the opening level of the digital file based on the sensitive information judging model;
Carrying out data partitioning on the digital file according to the opening grade and storing the digital file into an emergency digital resource access platform database;
detecting the network environment of the emergency digital resource access platform database in real time, and determining a user accessible time window based on an environmental risk coefficient;
Matching different access rights to users within the accessible IP range, and opening corresponding data partitions based on the different access rights;
and monitoring the access behavior of the user in the accessible time window and generating a user access log.
Preferably, the event response is an emergency plan generated by a pointer for a specific event, and determining the emergency digital resource scope and the accessible IP scope based on the event response includes:
and analyzing the emergency plan to obtain a response area and knowledge elements of the emergency plan.
And obtaining a corresponding knowledge graph according to the knowledge elements, and determining an emergency digital resource range according to the knowledge graph.
And determining an administrative division in the response area according to the response area of the emergency plan, and determining an accessible IP range according to the administrative division, wherein the administrative division takes a county level division as a minimum unit.
Preferably, the step of screening the corresponding digital file from the digital resource library according to the emergency digital resource range specifically includes:
And determining an entity, relationship and attribute triplet in the knowledge graph according to the knowledge graph, and performing natural language processing on unstructured data in the triplet to convert the unstructured data into structured data.
And clustering the structured data to construct a knowledge set based on the knowledge graph.
And performing word segmentation extraction on the catalogue and/or abstract of each file in the digital resource library to obtain a word segmentation set.
And calculating the association degree of the word segmentation set and the knowledge set, and determining the digital file with the association degree higher than a threshold value as the file in the emergency digital resource range.
Preferably, the specific method for calculating the association degree between the word segmentation set and the knowledge set is as follows:
The word segmentation set is subjected to text vectorization processing to obtain TF-IDF vectors of the word segmentation set,
The calculation formula of the TF-IDF vector is as follows: In the above, the ratio of/> Is word segmentationIn the word segmentation set/>Frequency of occurrence of/>Is word set/>In the word segmentation total number,/>Is the total number of digital files in the digital asset library,Is the word/>Is a digital file number of (a);
the TF-IDF vector of the knowledge set is calculated, and the association degree of the word segmentation set and the knowledge set is calculated according to vector information:
in the method, in the process of the invention, Is word set/>And knowledge set/>Text similarity of (c); /(I)Is word set/>And knowledge set/>Cosine similarity of (c); /(I),/>Vectors in the word segmentation set and knowledge set, respectively,/>Is the vector dimension.
Preferably, determining the opening level of the digital file based on the sensitive information determination model includes: if the digital file is marked with the opening grade during storage and warehousing, the opening grade is used;
if the digital file is not marked with the opening grade during storage and warehousing, the digital file content and the pre-built sensitive information base are stored
Carrying out semantic similarity calculation on the sensitive information; obtaining the opening level of the digital file according to the semantic similarity calculation result;
the opening level of the digital file is sequentially from low to high: public, restricted public, confidential and impersonative.
Preferably, the method for calculating the semantic similarity is to calculate the similarity between the meaning expression of the whole text corresponding to the word and the sensitive information by using a cosine distance:
in the method, in the process of the invention, Representing digital File/>Feature vector of each dimension of/(Representing a sensitive information repositoryFeature vector of each dimension of/(Representing a single vector dimension,/>Representing vector dimensions,/>,/>Respectively representing a digital file and a sensitive information base;
the higher the semantic similarity calculated value, the higher the security level of the file, and the lower the corresponding opening level.
Preferably, the digital file is divided into four storage areas according to four opening grades of the digital file, wherein the opening grades are that the digital file with public and limited public can be accessed and acquired through a user network port;
The digital files with confidential and confidential opening levels cannot be directly accessed through the user network port, and the user access management module is only used for processing access approval of the confidential and confidential digital files.
Preferably, detecting the network environment of the emergency digital resource access platform database in real time includes:
selecting each index from the network performance indexes, and determining the dependency relationship among the indexes;
obtaining a time sequence diagram of a certain time period of a corresponding index according to threat information received by a network environment of the emergency digital resource access platform database;
The prior probability of each index and the posterior probability of each index are statistically analyzed and calculated, and the maximum allowable quantity of probability change of risk factors of each index is obtained;
and calculating the network risk rate to obtain an environmental risk coefficient at the current moment, and opening user access when the environmental risk coefficient is lower than a preset threshold value.
Preferably, the user access log at least comprises time of access request, user information and user verification information.
In a second aspect, the present invention provides a system of the digital resource emergency management method according to the first aspect, the system comprising:
The system comprises an emergency response processing module, a digital file screening and classifying module, an emergency digital resource access platform database and a user access management module.
Preferably, the emergency response processing module is respectively connected with the digital file screening and classifying module and the user access management module, and is used for determining an emergency digital resource range and an accessible IP range based on event response, sending the emergency digital resource range to the digital file screening and classifying module, and sending the accessible IP range to the user access management module;
Preferably, the digital file screening and classifying module is connected with the emergency digital resource access platform database, and is used for screening out corresponding digital files in the digital resource library according to the emergency digital resource range, judging the opening grade of the digital files based on a sensitive information judging model, and carrying out data partitioning on the digital files according to the opening grade and storing the digital files in the emergency digital resource access platform database;
Preferably, the user access management module is connected with the emergency digital resource access platform database and the user side, and is used for detecting the network environment of the emergency digital resource access platform database in real time, determining a user accessible time window based on an environment risk coefficient, matching different access authorities for users within an accessible IP range, opening corresponding data partitions based on the different access authorities, monitoring the access behaviors of the users within the accessible time window and generating user access logs;
preferably, the emergency digital resource access platform database is used for storing the digital files screened by the digital file screening and classifying module and access logs of users, and calling corresponding digital file resources according to the access request of the user access management module.
Compared with the prior art, the invention has the beneficial effects that:
The digital resource emergency management method and system can provide corresponding digital resources for the masses and professional rescue workers to refer according to the emergency scheme when disasters occur, effectively improve the emergency response speed of the digital resources, improve the disaster emergency management level and have high practical value.
Drawings
FIG. 1 is a flow chart of a digital resource emergency management method of the present invention.
Fig. 2 is a schematic diagram of a digital resource emergency management system according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions in the present invention will be clearly and completely described below, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
In a first aspect, the present invention provides a digital resource emergency management method, as shown in fig. 1, which is a flowchart of the digital resource emergency management method of the present invention, the method includes the following steps:
step one, determining an emergency digital resource scope and an accessible IP scope based on the event response.
And step two, screening out corresponding digital files from the digital resource library according to the emergency digital resource range.
And step three, judging the opening level of the digital file based on the sensitive information judging model.
Step four, the digital file is subjected to data partitioning according to the opening grade and is stored in an emergency digital resource access platform database;
And fifthly, detecting the network environment of the emergency digital resource access platform database in real time, and determining a user accessible time window based on the environment risk coefficient.
Step six, matching different access rights to users in the accessible IP range, and opening corresponding data partitions based on the different access rights.
And step seven, monitoring the access behavior of the user in the accessible time window and generating a user access log.
The event response is an emergency plan generated by a pointer for a particular event, and determining an emergency digital resource scope and an accessible IP scope based on the event response includes:
and analyzing the emergency plan to obtain a response area and knowledge elements of the emergency plan.
And obtaining a corresponding knowledge graph according to the knowledge elements, and determining an emergency digital resource range according to the knowledge graph.
And determining an administrative division in the response area according to the response area of the emergency plan, and determining an accessible IP range according to the administrative division, wherein the administrative division takes a county level division as a minimum unit.
Preferably, the step of screening the corresponding digital file from the digital resource library according to the emergency digital resource range specifically includes:
And determining an entity, relationship and attribute triplet in the knowledge graph according to the knowledge graph, and performing natural language processing on unstructured data in the triplet to convert the unstructured data into structured data.
And clustering the structured data to construct a knowledge set based on the knowledge graph.
And performing word segmentation extraction on the catalogue and/or abstract of each file in the digital resource library to obtain a word segmentation set.
And calculating the association degree of the word segmentation set and the knowledge set, and determining the digital file with the association degree higher than a threshold value as the file in the emergency digital resource range.
The specific method for calculating the association degree between the word segmentation set and the knowledge set comprises the following steps:
The word segmentation set is subjected to text vectorization processing to obtain TF-IDF vectors of the word segmentation set,
The calculation formula of the TF-IDF vector is as follows: In the above, the ratio of/> Is word segmentationIn the word segmentation set/>Frequency of occurrence of/>Is word set/>In the word segmentation total number,/>Is the total number of digital files in the digital asset library,Is the word/>Is a digital file number of (a);
the TF-IDF vector of the knowledge set is calculated, and the association degree of the word segmentation set and the knowledge set is calculated according to vector information:
in the method, in the process of the invention, Is word set/>And knowledge set/>Text similarity of (c); /(I)Is word set/>And knowledge set/>Cosine similarity of (c); /(I),/>Vectors in the word segmentation set and knowledge set, respectively,/>Is the vector dimension.
Judging the opening level of the digital file based on the sensitive information judging model, comprising: if the digital file is marked with the opening grade when being stored and warehoused, the opening grade is used.
If the digital file is not marked with the opening grade during storage and warehousing, the digital file content and the pre-built sensitive information base are stored
Carrying out semantic similarity calculation on the sensitive information; and obtaining the opening grade of the digital file according to the semantic similarity calculation result.
The opening level of the digital file is sequentially from low to high: public, restricted public, confidential and impersonative.
The semantic similarity calculating method is to calculate similarity between sentence meaning expression of the whole text corresponding to the word and sensitive information by using cosine distance:
in the method, in the process of the invention, Representing digital File/>Feature vector of each dimension of/(Representing a sensitive information repositoryFeature vector of each dimension of/(Representing a single vector dimension,/>Representing vector dimensions,/>,/>Representing a digital file and a sensitive information base, respectively.
The higher the semantic similarity calculated value, the higher the security level of the file, and the lower the corresponding opening level.
Dividing the digital file into four storage areas according to four opening grades of the digital file, wherein the opening grades are that the digital file with public and limited public can be accessed and acquired through a user network port.
The digital files with confidential and confidential opening levels cannot be directly accessed through the user network port, and the user access management module is only used for processing access approval of the confidential and confidential digital files.
The network environment for detecting the emergency digital resource access platform database in real time comprises the following steps:
and selecting each index from the network performance indexes, and determining the dependency relationship among the indexes.
And obtaining a time sequence diagram of a certain time period of the corresponding index according to threat information received by the network environment of the emergency digital resource access platform database.
And (3) carrying out statistical analysis and calculating the prior probability of each index and the posterior probability of each index to obtain the maximum allowable quantity of probability change of the risk factors of each index.
And calculating the network risk rate to obtain an environmental risk coefficient at the current moment, and opening user access when the environmental risk coefficient is lower than a preset threshold value.
The user access log at least comprises time of access request, user information and user verification information.
Example 2
The present embodiment provides a system of the digital resource emergency management method according to embodiment 1, as shown in fig. 2, which is a schematic diagram of a composition of the digital resource emergency management system, and includes:
The system comprises an emergency response processing module, a digital file screening and classifying module, an emergency digital resource access platform database and a user access management module.
The emergency response processing module is respectively connected with the digital file screening and classifying module and the user access management module and is used for determining an emergency digital resource range and an accessible IP range based on event response, sending the emergency digital resource range to the digital file screening and classifying module and sending the accessible IP range to the user access management module;
the digital file screening and classifying module is connected with the emergency digital resource access platform database and is used for screening out corresponding digital files in the digital resource library according to the emergency digital resource range, judging the opening grade of the digital files based on a sensitive information judging model, and carrying out data partitioning on the digital files according to the opening grade and storing the digital files in the emergency digital resource access platform database;
The user access management module is connected with the emergency digital resource access platform database and the user side, and is used for detecting the network environment of the emergency digital resource access platform database in real time, determining a user accessible time window based on an environment risk coefficient, matching different access authorities for users within an accessible IP range, opening corresponding data partitions based on the different access authorities, monitoring the access behaviors of the users within the accessible time window and generating user access logs;
The emergency digital resource access platform database is used for storing the digital files screened by the digital file screening and classifying module and access logs of users, and calling corresponding digital file resources according to the access requests of the user access management module.
It should be noted that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or a combination of the two, and to clearly illustrate the interchangeability of hardware and software, the components and steps of the examples have been described generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Different methods may be used to implement the described functionality for each particular application, but such implementation is not to be considered as outside the scope of the application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the invention, and is not meant to limit the scope of the invention, but to limit the invention to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (6)

1. A digital resource emergency management method, comprising the steps of:
determining an emergency digital resource range and an accessible IP range based on the event response;
the event response is an emergency plan generated by a pointer for a specific event; determining an emergency digital resource scope and an accessible IP scope based on the event response includes:
Analyzing the emergency plan to obtain a response area and knowledge elements of the emergency plan;
obtaining a corresponding knowledge graph according to the knowledge elements, and determining an emergency digital resource range according to the knowledge graph;
Determining an administrative division in the response area according to the response area of the emergency plan, and determining an accessible IP range according to the administrative division, wherein the administrative division takes a county level division as a minimum unit;
screening out corresponding digital files from a digital resource library according to the emergency digital resource range;
the step of screening the corresponding digital file from the digital resource library according to the emergency digital resource range specifically comprises the following steps:
determining an entity, relationship and attribute triplet in the knowledge graph according to the knowledge graph, performing natural language processing on unstructured data in the triplet, and converting the unstructured data into structured data;
clustering the structured data to construct a knowledge set based on a knowledge graph;
performing word segmentation extraction on the catalogue and/or abstract of each file in the digital resource library to obtain a word segmentation set;
calculating the association degree of the word segmentation set and the knowledge set, and determining a digital file with the association degree higher than a threshold value as a file in the emergency digital resource range;
Judging the opening level of the digital file based on the sensitive information judging model;
if the digital file is marked with the opening grade during storage and warehousing, the opening grade is used;
If the digital file is not marked with the opening grade during storage and warehousing, carrying out semantic similarity calculation on the digital file content and the sensitive information in the pre-constructed sensitive information base; obtaining the opening level of the digital file according to the semantic similarity calculation result;
the opening level of the digital file is sequentially from low to high: public, restricted public, confidential and impersonative
Carrying out data partitioning on the digital file according to the opening grade and storing the digital file into an emergency digital resource access platform database;
detecting the network environment of the emergency digital resource access platform database in real time, and determining a user accessible time window based on an environmental risk coefficient;
the real-time detection of the network environment of the emergency digital resource access platform database comprises:
selecting each index from the network performance indexes, and determining the dependency relationship among the indexes;
obtaining a time sequence diagram of a certain time period of a corresponding index according to threat information received by a network environment of the emergency digital resource access platform database;
The prior probability of each index and the posterior probability of each index are statistically analyzed and calculated, and the maximum allowable quantity of probability change of risk factors of each index is obtained;
calculating a network risk ratio to obtain an environmental risk coefficient at the current moment, and opening user access when the environmental risk coefficient is lower than a preset threshold value;
Matching different access rights to users within the accessible IP range, and opening corresponding data partitions based on the different access rights;
and monitoring the access behavior of the user in the accessible time window and generating a user access log.
2. The digital resource emergency management method according to claim 1, wherein the specific method for calculating the association degree between the word segmentation set and the knowledge set is as follows:
The word segmentation set is subjected to text vectorization processing to obtain TF-IDF vectors of the word segmentation set,
The calculation formula of the TF-IDF vector is as follows: In the above, the ratio of/> Is word segmentation/>In the word segmentation set/>Frequency of occurrence of/>Is word set/>In the word segmentation total number,/>Is the total number of digital files in the digital asset library,/>Is the word/>Is a digital file number of (a);
the TF-IDF vector of the knowledge set is calculated, and the association degree of the word segmentation set and the knowledge set is calculated according to vector information:
in the method, in the process of the invention, Is word set/>And knowledge set/>Text similarity of (c); /(I)Is word set/>And knowledge set/>Cosine similarity of (c); /(I),/>Vectors in the word segmentation set and knowledge set, respectively,/>Is the vector dimension.
3. The digital resource emergency management method according to claim 2, wherein the semantic similarity calculating method is to calculate similarity between sentence meaning expression of the whole text corresponding to the word and sensitive information using cosine distance:
in the method, in the process of the invention, Representing digital File/>Feature vector of each dimension of/(Representing sensitive information base/>Feature vector of each dimension of/(Representing a single vector dimension,/>Representing vector dimensions,/>,/>Respectively representing a digital file and a sensitive information base;
the higher the semantic similarity calculated value, the higher the security level of the file, and the lower the corresponding opening level.
4. The digital resource emergency management method according to claim 2, wherein the digital file is divided into four storage areas according to four opening levels of the digital file, the opening levels being access acquisition of the digital file through a user network port;
The digital files with confidential and confidential opening levels cannot be directly accessed through the user network port, and the user access management module is only used for processing access approval of the confidential and confidential digital files.
5. The digital resource emergency management method of claim 4, wherein the user access log includes at least time of access request, user information, user authentication information.
6. A system employing the digital resource emergency management method of any one of claims 1-5, the system comprising:
The system comprises an emergency response processing module, a digital file screening and classifying module, an emergency digital resource access platform database and a user access management module;
the emergency response processing module is respectively connected with the digital file screening and classifying module and the user access management module and is used for determining an emergency digital resource range and an accessible IP range based on event response, sending the emergency digital resource range to the digital file screening and classifying module and sending the accessible IP range to the user access management module;
the digital file screening and classifying module is connected with the emergency digital resource access platform database and is used for screening out corresponding digital files in the digital resource library according to the emergency digital resource range, judging the opening grade of the digital files based on a sensitive information judging model, and carrying out data partitioning on the digital files according to the opening grade and storing the digital files in the emergency digital resource access platform database;
The user access management module is connected with the emergency digital resource access platform database and the user side, and is used for detecting the network environment of the emergency digital resource access platform database in real time, determining a user accessible time window based on an environment risk coefficient, matching different access authorities for users within an accessible IP range, opening corresponding data partitions based on the different access authorities, monitoring the access behaviors of the users within the accessible time window and generating user access logs;
The emergency digital resource access platform database is used for storing the digital files screened by the digital file screening and classifying module and access logs of users, and calling corresponding digital file resources according to the access requests of the user access management module.
CN202410123673.XA 2024-01-30 2024-01-30 Digital resource emergency management method and system Active CN117688135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410123673.XA CN117688135B (en) 2024-01-30 2024-01-30 Digital resource emergency management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410123673.XA CN117688135B (en) 2024-01-30 2024-01-30 Digital resource emergency management method and system

Publications (2)

Publication Number Publication Date
CN117688135A CN117688135A (en) 2024-03-12
CN117688135B true CN117688135B (en) 2024-04-30

Family

ID=90126773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410123673.XA Active CN117688135B (en) 2024-01-30 2024-01-30 Digital resource emergency management method and system

Country Status (1)

Country Link
CN (1) CN117688135B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113918511A (en) * 2021-10-21 2022-01-11 上海威固信息技术股份有限公司 Multi-factor data analysis processing method, system and storage medium
CN116226908A (en) * 2022-12-27 2023-06-06 北京市大数据中心 Data security emergency management analysis method and system based on big data
CN116545731A (en) * 2023-05-29 2023-08-04 中科天御(苏州)科技有限公司 Zero-trust network access control method and system based on time window dynamic switching
CN117112776A (en) * 2023-09-23 2023-11-24 宏景科技股份有限公司 Enterprise knowledge base management and retrieval platform and method based on large language model

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109597848A (en) * 2018-11-21 2019-04-09 北京域天科技有限公司 A kind of shared exchange system of emergency resources

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113918511A (en) * 2021-10-21 2022-01-11 上海威固信息技术股份有限公司 Multi-factor data analysis processing method, system and storage medium
CN116226908A (en) * 2022-12-27 2023-06-06 北京市大数据中心 Data security emergency management analysis method and system based on big data
CN116545731A (en) * 2023-05-29 2023-08-04 中科天御(苏州)科技有限公司 Zero-trust network access control method and system based on time window dynamic switching
CN117112776A (en) * 2023-09-23 2023-11-24 宏景科技股份有限公司 Enterprise knowledge base management and retrieval platform and method based on large language model

Also Published As

Publication number Publication date
CN117688135A (en) 2024-03-12

Similar Documents

Publication Publication Date Title
US9525702B2 (en) Similarity search and malware prioritization
CN107273752B (en) Vulnerability automatic classification method based on word frequency statistics and naive Bayes fusion model
US11599667B1 (en) Efficient statistical techniques for detecting sensitive data
CN111444514A (en) Information security risk assessment method and device, equipment and storage medium
CN111291070A (en) Abnormal SQL detection method, equipment and medium
KR20180129001A (en) Method and System for Entity summarization based on multilingual projected entity space
CN115622738A (en) RBF neural network-based safety emergency disposal system and method
CN116701641B (en) Hierarchical classification method and device for unstructured data
CN112099870B (en) Document processing method, device, electronic equipment and computer readable storage medium
CN117688135B (en) Digital resource emergency management method and system
Wang et al. Application research of file fingerprint identification detection based on a network security protection system
CN116488840A (en) Vulnerability situation assessment method and device, electronic equipment and storage medium
CN114510720A (en) Android malicious software classification method based on feature fusion and NLP technology
CN113723514A (en) Safe access log data balance processing method based on hybrid sampling
Paryani et al. Entropy-based model for estimating veracity of topics from tweets
Hakim et al. Oversampling imbalance data: Case study on functional and non functional requirement
CN112199585A (en) Network public opinion emergent hotspot event discovery method based on data mining technology
She et al. WS-Sim: A web service simulation toolset with realistic data support
Kabwe et al. Identity attributes metric modelling based on mathematical distance metrics models
Kumar et al. Brain storm optimization based association rule mining model for intelligent phishing URLs websites detection
CN116881687B (en) Power grid sensitive data identification method and device based on feature extraction
CN115809466B (en) Security requirement generation method and device based on STRIDE model, electronic equipment and medium
CN116719942B (en) Data asset classification method, apparatus, computer device and computer storage medium
CN116112264B (en) Method and device for controlling access to strategy hidden big data based on blockchain
Jin Network Data Detection for Information Security Using CNN-LSTM Model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant