Citation: | Xia Chunhe, Wei Yudi, Li Xiaojian, et al. Computer network defense policy model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(8): 925-929. (in Chinese) |
[1] Sloman M S. Policy driven management for distributed systems[J]. Journal of Network and Systems Management,1994, 2(4):333-360[2] Stern D F. On the buzzword "security policy" Security and Privacy. Los Alamitors:IEEE CS Press, 1991: 219-230[3] 夏春和. 基于入侵诱骗的防御体系及关键技术研究 . 北京:北京航空航天大学计算机学院, 2003 Xia Chunhe. Research on intrusion-deception-based network defense architecture and key technology . Beijing: School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics,2003(in Chinese)[4] Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security Grid and Cooperative Computing. Berlin:Springer, 2004, 3252:437-439[5] Moffett J D, Sloman M S. Policy hierarchies for distributed systems management[J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414[6] Wies R. Using a classification of management policies for policy specification and policy transformation Integrated Network Management.London:Chapman Hill, 1995:44-56[7] Katri Ylitalo. Policy core information model . 2000. [8] Kim S Y, Kim M E, Kim K, et al. Information model for policy-based network security management Wired Communications and Management. Berlin:Springer, 2002, 2343: 662-672[9] Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism Information Security and Cryptology. Berlin:Springer, 2006,4318: 168-181[10] Bartal Y, Mayer A J, Nissim K, et al. Firmato: a novel firewall management toolkit[J]. ACM Transactions on Computer Systems, 2004, 22(4):381-420[11] Luck I, Schafer C, Krumm H. Model-based tool assistance for packet-filter design Policies for Distributed Systems and Networks. Berlin:Springer, 2001: 120-136[12] Kalam A Abou El, Baida R El, Balbiani P, et al. Organization based access control Policies for Distributed Systems and Networks (POLICY'03).Lake Como:IEEE CS Press, 2003 :120-131[13] Cuppens F, Cuppens-Boulahia N, Sans T, et al. A formal approach to specify and deploy a network security policy[J]. Second Workshop on Formal Aspects in Security and Trust, 2004[14] Debar H, Thomas Y, Boulahia-Cuppens N, et al. Using contextual security policies for threat response Detection of Intrusions and Malware & Vulnerability Assessment. Berlin:Springer, 2006,4064:109-128[15] 许国志. 系统科学[M]. 上海:上海科技教育出版社, 2000 Xu Guozhi. System science[M]. Shanghai: Shanghai Scientific and Technological Education Publishing House,2000(in Chinese)[16] Nstissc.National information systems security (infosec) glossary[S]. Nstissi No 4009: Nstissc,2000[17] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer,1996, 29(2):38-47
|
[1] | RUAN S L,DONG Z,SUN Y,et al. Parameter optimization method of thrust vector/pneumatic rudder composite control law for aircraft based on singular value method[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(4):1332-1341 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0227. |
[2] | KONG Lingwei, LI Weiqi. Optimization of aircraft speed vector control based on Hp adaptive Pseudo-spectral method[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0405 |
[3] | NIE Li, LI Chenliang, LIU Wangkui, SHEN Haidong, LIU Yanbin, CHEN Jinbao. Adaptive neural network based fixed-time command-filtered control for quadrotor unmanned aerial vehicles[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0403 |
[4] | ZHENG W M,XU Y,LUO D L. Fixed-time formation control of quadrotor UAV swarm with unknown disturbances[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1702-1712 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0506. |
[5] | LYU Yuzhu. Study on Flight Characteristics and Speed Limit of Helicopter with Slung Load[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0563 |
[6] | TAN J F,YANG Y X,ZHANG W G,et al. Influence of crosswind on helicopter brownout[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(10):3111-3122 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0794. |
[7] | DUAN B,YANG S,LI A J. Design of LPV control law for unmanned helicopter[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(4):879-890 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0340. |
[8] | LI Z W,PENG M Y,GAO C Q,et al. Air combat maneuver trajectory prediction of target based on Volterra series optimized by SABA algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(3):503-513 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0287. |
[9] | WU X J,HAN X R,WU X L,et al. Prescribed performance control for quadrotor UAV with unknown kinetic parameters[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(10):2587-2595 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0714. |
[10] | SONG Z R,ZHAO J C,YANG W F. Boundary protection control method of helicopter power system based on flight test analysis[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):100-105 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0431. |
[11] | YANG K L,HAN D. Influence of rotor/wing aerodynamic interference on performance of compound helicopters[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(7):1761-1771 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0561. |
[12] | ZHANG X C,WAN Z Q,YAN D. Optimal active twist control for rotor vibration reduction[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(12):3397-3408 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0105. |
[13] | JIN Z B,LI D C,SUN Y,et al. Man-machine cooperative control of helicopter and flight experimental validation[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(11):3022-3030 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0038. |
[14] | SU D C,WANG Z Z,WU L H,et al. Flight characteristics of coaxial-rigid-rotor helicopter during deck landing[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(4):832-841 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0358. |
[15] | TAN J F,HAN S,WANG C,et al. Accelerated computational method of helicopter brownout based on DEM[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(6):1352-1361 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0450. |
[16] | HUANG Mingqi, WANG Liangquan, YUAN Honggang, PENG Xianmin, ZHANG Guichuan. Icing wind tunnel investigation of helicopter rotor model in forward flight state[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(6): 929-936. doi: 10.13700/j.bh.1001-5965.2020.0703 |
[17] | LI Ting, WANG Xinmin, YANG Ting, CAO Yuyan, XIE Rong. Fault-tolerant synchronization control for a dual redundant electro-hydraulic actuator system based on velocity estimation[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020, 46(10): 1929-1940. doi: 10.13700/j.bh.1001-5965.2019.0564 |
[18] | XU Menghui, QIU Zhiping. Parametric finite element meshing and adjustment for delta wing[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(9): 1659-1665. doi: 10.13700/j.bh.1001-5965.2014.0641 |
[19] | Liu Hongmei, Lü Chen, Ouyang Pingchao, Wang Shaoping. Helicopter rotor tuning based on neural network and particle swarm optimization[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(3): 283-288. |
[20] | Xue Liangru, Wang Shaoping. Dynamics analysis and modeling of helicopter rotor test-bed[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(3): 296-299. |