NETWORK SECURITY DEFENSE METHOD, SYSTEM AND EFFECT EVALUATION METHOD, AND RELATED APPARATUS
According to the technical solution of the present application, a first policy comprising an encoding, decoding and memory removal policy is used to eliminate the influence of generalized perturbation on a second policy, and the second policy is applied to data, so as to realize the correct calculat...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | According to the technical solution of the present application, a first policy comprising an encoding, decoding and memory removal policy is used to eliminate the influence of generalized perturbation on a second policy, and the second policy is applied to data, so as to realize the correct calculation, storage and communication of the data. Since the generalized perturbation, serving as an external cause, can activate an internal cause of a fault of the second policy so as to generate errors and failures, errors and failures caused by the activated failure can be corrected by means of the first policy. Furthermore, since the first policy is obtained by means of adjusting a feedback control policy triggered by a decoding result of the processed data, a closed loop is formed between steps, and there is no need to solve endogenous security problems by means of external software and hardware. In summary, by means of the technical solution provided in the present application, endogenous security problems can be s |
---|