您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2023, Vol. 58 ›› Issue (1): 1-9.doi: 10.6040/j.issn.1671-9352.0.2022.493

• •    

证据推理与检索数据网络安全获取

陈淑珍1,3,李守伟2,史开泉1*   

  1. 1. 山东大学数学学院, 山东 济南 250100;2. 山东师范大学商学院, 山东 济南 250014;3. 福建警察学院计算机与信息安全管理系, 福建 福州 350007
  • 发布日期:2023-02-12
  • 作者简介:陈淑珍(1969— ), 女, 硕士, 副教授, 研究方向为大数据分析与信息安全. E-mail:chenshuzhen@fjpsc.edu.cn*通信作者简介:史开泉(1945— ), 男, 教授, 博士生导师, 研究方向为信息融合与数学模型交叉研究. E-mail: shikq@sdu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(71663010);山东省自然科学基金项目(ZR2019MG015);福建省科技厅项目(2020H6024);2022年福建省财政厅省直单位科研专项

Network security acquisition of evidence reasoning and retrieval data

CHEN Shu-zhen1,3, LI Shou-wei2, SHI Kai-quan1*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. School of Business, Shandong Normal University, Jinan 250014, Shandong, China;
    3. Department of Computer and Information Security Management, Fujian Police College, Fuzhou 350007, Fujian, China
  • Published:2023-02-12

摘要: 利用动态数学模型,首先给出了内-数据、外-数据与内-外数据概念,然后给出了证据推理与检索数据智能获取定理和网络数据空间与数据-证据关系定理,进而给出了检索数据的网络安全获取算法,最后给出了这些概念、理论结果的应用。

关键词: 证据推理, 检索数据, 网络数据空间, 安全算法

Abstract: Using the dynamic mathematical model, the concepts of inner-data, outer-data and inner & outer-data are given firstly; then, the intelligent acquisition theorems of evidence reasoning and retrieval data and the theorems of network data space and data evidence relationship are given; then, the network security acquisition algorithm of retrieval data is given; finally, the application of these concepts and theoretical results are also given.

Key words: evidence reasoning, retrieval data, network data space, security algorithm

中图分类号: 

  • O144
[1] 史开泉.大数据结构-逻辑特征与大数据规律[J]. 山东大学学报(理学版), 2019, 54(2):1-29. SHI Kaiquan. Big data structure-logic characteristics and big data law[J]. Journal of Shandong University(Natural Science), 2019, 54(2):1-29.
[2] 史开泉.P-集合,逆P-集合与信息智能融合-过滤辨识[J]. 计算机科学, 2012, 39(4):1-13. SHI Kaiquan. P-sets, inverse P-sets and the intelligent fusion-filter identification of information[J]. Computer Science, 2012, 39(4):1-13.
[3] 史开泉.P-集合[J]. 山东大学学报(理学版), 2008, 43(11):77-84. SHI Kaiquan. P-sets[J]. Journal of Shandong University(Natural Science), 2008, 43(11):77-84.
[4] SHI Kaiquan. P-sets and its applications[J]. Advances in Systems Science and Applications, 2009, 9(2):209-219.
[5] 史开泉.P-集合与它的应用特性[J].计算机科学, 2010, 37(8):1-8. SHI Kaiquan. P-sets and its applied characteristics[J]. Computer Science, 2010, 37(8):1-8.
[6] 史开泉.P-推理与信息的P-推理发现-辨识[J].计算机科学,2011,38(7):1-9. SHI Kaiquan. P-reasoning and P-reasoning discovery-identification of information[J]. Computer Science, 2011, 38(7):1-9.
[7] FAN Chengxian, LIN Hongkang. P-sets and the reasoning-identification of disaster information[J]. International Journal of Convergence Information Technology, 2012, 7(1):337-345.
[8] LIN Hongkang, FAN Chengxian. The dual form of P-reasoning and identification of unknown attribute[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(1):121-131.
[9] 张丽,崔玉泉,史开泉.外P-集合与数据内-恢复[J]. 系统工 程与电子技术,2010,32(6):1233-1238. ZHANG Li, CUI Yuquan, SHI Kaiquan. Outer P-sets and data internal recovery [J]. Systems Engineering and Electronics. 2010, 32(6):1233-1238.
[10] 李豫颖,林宏康,史开泉.数据离散区间特征与数据发现-应用[J].系统工程与电子技术,2011,33(10):2258-2262. LI Yuying, LIN Hongkang, SHI Kaiquan. Characteristics of data discrete interval and data discovery-application [J]. Systems Engineering and Electronics, 2011, 33(10):2258-2262.
[11] 张凌,汤积华,史开泉.内P-信息融合与它的属性合取特征[J].山东大学学报(理学版),2014,49(2):93-97. ZHANG Ling, TANG Jihua, SHI Kaiquan. The fusion of internal P-information and its feature of attribute conjunction [J]. Journalof Shandong University(Natural Science), 2014, 49(2):93-97.
[12] 史开泉,张丽.内 P-集合与数据外-恢复[J]. 山东大学学报(理学版),2009,44(4):8-14. SHI Kaiquan, ZHANG Li. Internal P-set and data outer-recovery[J]. Journal of Shandong University(Natural Science), 2009, 44(4):8-14.
[13] 张冠宇,周厚勇,史开泉.P-集合与双P-数据恢复-辨识[J]. 系统工程与电子技术, 2010, 32(9):1919-1924. ZHANG Guanyu, ZHOU Houyong, SHI Kaiquan. P-sets and the recovery-identification of double P-data [J]. Systems Engineering and Electronics, 2010, 32(9):1919-1924.
[14] ZHANG Ling, REN Xuefang. P-sets and (f,(-overf))-heredity[J]. Quantitative Logic and Soft Computing, 2010, 2(1):735-743.
[15] 赵树理,吴松丽,史开泉.内 P-推理信息恢复与属性潜藏推理发现[J]. 计算机科学, 2013, 40(4):209-213. ZHAO Shuli, WU Songli, SHI Kaiquan. Internal P-reasoning information recovery and attribute hiding searching discovery[J]. Computer Science, 2013, 40(4):209-213.
[16] 史开泉.函数 P-集合[J]. 山东大学学报(理学版),2011,46(2):62-69. SHI Kaiquan. Function P-sets[J]. Journal of Shandong University(Natural Science), 2011, 46(2):62-69.
[17] SHI Kaiquan. Function P-sets[J]. International Journal of Machine Learning and Cybernetics, 2011, 2(4):281-288.
[18] 史开泉. P-信息规律智能融合与软信息图像智能生成[J]. 山东大学学报(理学版), 2014, 49(4):1-17. SHI Kaiquan. P-information law intelligent fusion and soft information image intelligent generation[J]. Journal of Shandong University(Natural Science), 2014, 49(4):1-17.
[19] 汤积华,张凌,史开泉.信息规律智能融合与它的智能融合分离[J]. 计算机科学,2015,42(2):204-209. TANG Jihua, ZHANG Ling, SHI Kaiquan. Intelligent fusion of information law and its inner separation[J]. Computer Science, 2015, 42(2):204-209.
[20] 任雪芳,张凌,史开泉.两类动态信息规律模型及其在信息伪装、风险识别中的应用[J]. 计算机科学,2018, 45(9):230-236. REN Xufang, ZHANG Ling, SHI Kaiquan. Two types of dynamic information law models and their applications in information camouflage and risk identification[J]. Computer Science, 2018, 45(9):230-236.
[21] 陈保会,张凌,史开泉.P-信息智能动态融合与信息规律状态智能识别[J]. 山东大学学报(理学版), 2018, 53(2):83-87. CHEN Baohui, ZHANG Ling, SHI Kaiquan. Intelligent dynamic fusion of P-information and the intelligent state recognitionof information law[J]. Journal of Shandong University(Natural Science), 2018, 53(2):83-87.
[22] TANG Jihua, ZHANG Ling, SHI Kaiquan, et al. Outer P-information law reasoning andits application in intelligent fusion and separating of information law[J]. Microsystem Technologies, 2018, 24(10):4389-4398.
[23] 史开泉.P-增广矩阵与信息的智能动态发现-辨识[J]. 山东大学学报(理学版), 2015, 50(10):1-12. SHI Kaiquan. P-augmented matrix and dynamic intelligent discovery-identification of information[J]. Journal of Shandong University(Natural Science), 2015, 50(10):1-12.
[24] LIN Hongkang, FAN Chengxian. Embedding camouflage of inverse P-information and application[J]. International Journal of Convergence Information and Technology, 2012, 7(20):471-480.
[25] FAN Chengxian, HUANG Shunliang. Inverse P-reasoning discovery identification of inverse P-information[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(20):735-744.
[26] ZHANG Ling, REN Xuefang, SHI Kaiquan, et al. Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J]. Microsystem Technologies, 2018, 24(10):4415-4421.
[27] REN Xuefang, ZHANG Ling, SHI Kaiquan, et al. Inverse P-augmented matrix method-based the dynamic findings of unknown information[J]. Microsystem Technologies, 2018, 24(10):4187-4192.
[28] ZHANG Ling, REN Xuefang, SHI Kaiquan. Inverse P-information law models and the reality-camouflage intelligent transformations of information image[C] //Proceedings of the 2016 International Conference on Network and Information Systems for Computers. Washington:IEEE, 2016: 337-341.
[29] 任雪芳, 张凌, 史开泉. 基数余-亏与逆 P-增广矩阵[J] ,山东大学学报(理学版), 2015, 50(10): 13-18, 26. REN Xuefang, ZHANG Ling, SHI Kaiquan. Surplus-deficiency of cardinal number and inverse P-augmented matrices[J]. Journal of Shandong University(Natural Science), 2015, 50(10): 13-18, 26.
[30] 张凌,任雪芳. 基数余-亏定理与数据外-内挖掘-分离[J]. 山东大学学报(理学版), 2015, 50(8):90-94. ZHANG Ling, REN Xuefang. Surplus-deficient theorem of cardinal number and data internal-outer mining-separation[J]. Journal of Shandong University(Natural Science), 2015, 50(8):90-94.
[31] 任雪芳,张凌,史开泉.逆P-集合的边界特征与系统状态监测[J]. 计算机科学, 2016,43(10): 211-213,255. REN Xuefang, ZHANG Ling, SHI Kaiquan. Boundary characteristics of inverse P-sets and system condition monitoring[J]. Computer Science, 2016,43(10): 211-213, 255.
[32] 任雪芳,张凌.逆P-集合的扰动定理与数据的扰动挖掘[J]. 山东大学学报(理学版), 2016, 51(12): 54-60. REN Xuefang, ZHANG Ling. Perturbation theorems of inverse P-sets and perturbation-based data mining[J]. Journal of Shandong University(Natural Science), 2016, 51(12): 54-60.
[33] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
[34] MENEZES A J, VANSTONE S A. Elliptic curve cryptosystems and their implementation[J]. J Cryptology, 1993, 6(4):209-224.
[35] 史开泉,赵建立.函数S-粗集与隐藏规律安全认证[J]. 中国科学: E辑, 2008, 38(8):1234-1243. SHI Kaiquan, ZHAO Jianli. Function S-rough sets and security-authentication of hiding law[J]. Scinence in China: E, 2008, 38(8):1234-1243.
[36] SHI Kaiquan, ZHAO Jianli. Function S-rough sets and security-authentication of hiding law[J]. Science in China Series F: Information Sciences, 2008, 51(7):924-935.
[1] 王佳麒,杨沐昀,赵铁军,赵臻宇. 检务文书检索数据集的构建[J]. 《山东大学学报(理学版)》, 2020, 55(7): 81-87.
[2] 凌密然, 米据生, 马丽. 异构形式背景上的不确定推理[J]. 山东大学学报(理学版), 2014, 49(08): 28-32.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!