国产乱妇一级a视频,欧美亚洲国产激情一区二区,国产精品片免费看,国产精品xxxx国产喷水

<ol id="yumkc"><nobr id="yumkc"><kbd id="yumkc"></kbd></nobr></ol>

<output id="yumkc"><center id="yumkc"><ol id="yumkc"></ol></center></output>

        1. ENGLISH
          您所在的位置: 首頁(yè)» 新聞中心» 講座預(yù)告

          6-8斯蒂文斯理工學(xué)院張弛博士應(yīng)邀管理與經(jīng)濟(jì)學(xué)院作學(xué)術(shù)報(bào)告

          題 目:Critical Infrastructure Protection against Intentional Attacks
          主講人:張弛博士 (斯蒂文斯理工學(xué)院)
          時(shí) 間:2012年6月8日 上午10:00
          地 點(diǎn):主樓418會(huì)議室
          主講人簡(jiǎn)介:
              Chi Zhang received his PhD in Systems Engineering at School of Systems and Enterprises (SSE), Stevens Institute of Technology in 2012. His research focus is on understanding infrastructure performance degradation and upkeep when considering external threats. His research spans reliability and vulnerability analysis for optimization. He is the recipient of the outstanding dissertation award and the best student paper award of SSE, Stevens Institute of Technology, 2012. He received a B.S. degree in Industrial Engineering and a M.S. degree in Management Science & Engineering from Xi’an Jiaotong University in 2004 and 2007 respectively.
          內(nèi)容簡(jiǎn)介:
              One of the main threats to networked critical infrastructures is from intentional attackers, who are resourceful and inventive. For developing affordable protection strategies for these infrastructures, this talk introduces game theoretic approaches to study the interaction between protector and rational attackers. This talk firstly focuses on the detection of an infrastructure’s vulnerabilities, understood in this research as the critical components that the attacker targets to maximize the damage to an infrastructure. To do so, two optimization frameworks for critical components detection are presented under two different conditions of information availability: complete and incomplete information. Secondly, based on vulnerabilities detection, the protector’s two information disclosing policies, namely disclosure and secrecy, are studied respectively in two types of games: two-stage game and simultaneous game. Compared with traditional research, the proposed approaches are more realistic since they can be applied to the protection of critical infrastructures with both large scale and general topologies. Moreover, incomplete information and mixed strategies are respectively considered in the two-stage game and the simultaneous game.

          (承辦:技術(shù)經(jīng)濟(jì)及管理系)
           

          TOP