tjytzc.com-亚洲日本乱码在线观看,国产精品亚洲一区二区z,亚洲欧洲aⅴ在线不卡视频,久久亚洲中文字幕精品一区,中文字幕avav,国产乱码精品一品二品,国产免费1区2区3区四区,亚洲欧洲日韩二区aaaaa

ENGLISH
您所在的位置: 首頁» 新聞中心» 講座預(yù)告

6-8斯蒂文斯理工學(xué)院張弛博士應(yīng)邀管理與經(jīng)濟學(xué)院作學(xué)術(shù)報告

題 目:Critical Infrastructure Protection against Intentional Attacks
主講人:張弛博士 (斯蒂文斯理工學(xué)院)
時 間:2012年6月8日 上午10:00
地 點:主樓418會議室
主講人簡介:
    Chi Zhang received his PhD in Systems Engineering at School of Systems and Enterprises (SSE), Stevens Institute of Technology in 2012. His research focus is on understanding infrastructure performance degradation and upkeep when considering external threats. His research spans reliability and vulnerability analysis for optimization. He is the recipient of the outstanding dissertation award and the best student paper award of SSE, Stevens Institute of Technology, 2012. He received a B.S. degree in Industrial Engineering and a M.S. degree in Management Science & Engineering from Xi’an Jiaotong University in 2004 and 2007 respectively.
內(nèi)容簡介:
    One of the main threats to networked critical infrastructures is from intentional attackers, who are resourceful and inventive. For developing affordable protection strategies for these infrastructures, this talk introduces game theoretic approaches to study the interaction between protector and rational attackers. This talk firstly focuses on the detection of an infrastructure’s vulnerabilities, understood in this research as the critical components that the attacker targets to maximize the damage to an infrastructure. To do so, two optimization frameworks for critical components detection are presented under two different conditions of information availability: complete and incomplete information. Secondly, based on vulnerabilities detection, the protector’s two information disclosing policies, namely disclosure and secrecy, are studied respectively in two types of games: two-stage game and simultaneous game. Compared with traditional research, the proposed approaches are more realistic since they can be applied to the protection of critical infrastructures with both large scale and general topologies. Moreover, incomplete information and mixed strategies are respectively considered in the two-stage game and the simultaneous game.

(承辦:技術(shù)經(jīng)濟及管理系)
 

TOP