JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2023, Vol. 58 ›› Issue (1): 1-9.doi: 10.6040/j.issn.1671-9352.0.2022.493

   

Network security acquisition of evidence reasoning and retrieval data

CHEN Shu-zhen1,3, LI Shou-wei2, SHI Kai-quan1*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. School of Business, Shandong Normal University, Jinan 250014, Shandong, China;
    3. Department of Computer and Information Security Management, Fujian Police College, Fuzhou 350007, Fujian, China
  • Published:2023-02-12

Abstract: Using the dynamic mathematical model, the concepts of inner-data, outer-data and inner & outer-data are given firstly; then, the intelligent acquisition theorems of evidence reasoning and retrieval data and the theorems of network data space and data evidence relationship are given; then, the network security acquisition algorithm of retrieval data is given; finally, the application of these concepts and theoretical results are also given.

Key words: evidence reasoning, retrieval data, network data space, security algorithm

CLC Number: 

  • O144
[1] 史开泉.大数据结构-逻辑特征与大数据规律[J]. 山东大学学报(理学版), 2019, 54(2):1-29. SHI Kaiquan. Big data structure-logic characteristics and big data law[J]. Journal of Shandong University(Natural Science), 2019, 54(2):1-29.
[2] 史开泉.P-集合,逆P-集合与信息智能融合-过滤辨识[J]. 计算机科学, 2012, 39(4):1-13. SHI Kaiquan. P-sets, inverse P-sets and the intelligent fusion-filter identification of information[J]. Computer Science, 2012, 39(4):1-13.
[3] 史开泉.P-集合[J]. 山东大学学报(理学版), 2008, 43(11):77-84. SHI Kaiquan. P-sets[J]. Journal of Shandong University(Natural Science), 2008, 43(11):77-84.
[4] SHI Kaiquan. P-sets and its applications[J]. Advances in Systems Science and Applications, 2009, 9(2):209-219.
[5] 史开泉.P-集合与它的应用特性[J].计算机科学, 2010, 37(8):1-8. SHI Kaiquan. P-sets and its applied characteristics[J]. Computer Science, 2010, 37(8):1-8.
[6] 史开泉.P-推理与信息的P-推理发现-辨识[J].计算机科学,2011,38(7):1-9. SHI Kaiquan. P-reasoning and P-reasoning discovery-identification of information[J]. Computer Science, 2011, 38(7):1-9.
[7] FAN Chengxian, LIN Hongkang. P-sets and the reasoning-identification of disaster information[J]. International Journal of Convergence Information Technology, 2012, 7(1):337-345.
[8] LIN Hongkang, FAN Chengxian. The dual form of P-reasoning and identification of unknown attribute[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(1):121-131.
[9] 张丽,崔玉泉,史开泉.外P-集合与数据内-恢复[J]. 系统工 程与电子技术,2010,32(6):1233-1238. ZHANG Li, CUI Yuquan, SHI Kaiquan. Outer P-sets and data internal recovery [J]. Systems Engineering and Electronics. 2010, 32(6):1233-1238.
[10] 李豫颖,林宏康,史开泉.数据离散区间特征与数据发现-应用[J].系统工程与电子技术,2011,33(10):2258-2262. LI Yuying, LIN Hongkang, SHI Kaiquan. Characteristics of data discrete interval and data discovery-application [J]. Systems Engineering and Electronics, 2011, 33(10):2258-2262.
[11] 张凌,汤积华,史开泉.内P-信息融合与它的属性合取特征[J].山东大学学报(理学版),2014,49(2):93-97. ZHANG Ling, TANG Jihua, SHI Kaiquan. The fusion of internal P-information and its feature of attribute conjunction [J]. Journalof Shandong University(Natural Science), 2014, 49(2):93-97.
[12] 史开泉,张丽.内 P-集合与数据外-恢复[J]. 山东大学学报(理学版),2009,44(4):8-14. SHI Kaiquan, ZHANG Li. Internal P-set and data outer-recovery[J]. Journal of Shandong University(Natural Science), 2009, 44(4):8-14.
[13] 张冠宇,周厚勇,史开泉.P-集合与双P-数据恢复-辨识[J]. 系统工程与电子技术, 2010, 32(9):1919-1924. ZHANG Guanyu, ZHOU Houyong, SHI Kaiquan. P-sets and the recovery-identification of double P-data [J]. Systems Engineering and Electronics, 2010, 32(9):1919-1924.
[14] ZHANG Ling, REN Xuefang. P-sets and (f,(-overf))-heredity[J]. Quantitative Logic and Soft Computing, 2010, 2(1):735-743.
[15] 赵树理,吴松丽,史开泉.内 P-推理信息恢复与属性潜藏推理发现[J]. 计算机科学, 2013, 40(4):209-213. ZHAO Shuli, WU Songli, SHI Kaiquan. Internal P-reasoning information recovery and attribute hiding searching discovery[J]. Computer Science, 2013, 40(4):209-213.
[16] 史开泉.函数 P-集合[J]. 山东大学学报(理学版),2011,46(2):62-69. SHI Kaiquan. Function P-sets[J]. Journal of Shandong University(Natural Science), 2011, 46(2):62-69.
[17] SHI Kaiquan. Function P-sets[J]. International Journal of Machine Learning and Cybernetics, 2011, 2(4):281-288.
[18] 史开泉. P-信息规律智能融合与软信息图像智能生成[J]. 山东大学学报(理学版), 2014, 49(4):1-17. SHI Kaiquan. P-information law intelligent fusion and soft information image intelligent generation[J]. Journal of Shandong University(Natural Science), 2014, 49(4):1-17.
[19] 汤积华,张凌,史开泉.信息规律智能融合与它的智能融合分离[J]. 计算机科学,2015,42(2):204-209. TANG Jihua, ZHANG Ling, SHI Kaiquan. Intelligent fusion of information law and its inner separation[J]. Computer Science, 2015, 42(2):204-209.
[20] 任雪芳,张凌,史开泉.两类动态信息规律模型及其在信息伪装、风险识别中的应用[J]. 计算机科学,2018, 45(9):230-236. REN Xufang, ZHANG Ling, SHI Kaiquan. Two types of dynamic information law models and their applications in information camouflage and risk identification[J]. Computer Science, 2018, 45(9):230-236.
[21] 陈保会,张凌,史开泉.P-信息智能动态融合与信息规律状态智能识别[J]. 山东大学学报(理学版), 2018, 53(2):83-87. CHEN Baohui, ZHANG Ling, SHI Kaiquan. Intelligent dynamic fusion of P-information and the intelligent state recognitionof information law[J]. Journal of Shandong University(Natural Science), 2018, 53(2):83-87.
[22] TANG Jihua, ZHANG Ling, SHI Kaiquan, et al. Outer P-information law reasoning andits application in intelligent fusion and separating of information law[J]. Microsystem Technologies, 2018, 24(10):4389-4398.
[23] 史开泉.P-增广矩阵与信息的智能动态发现-辨识[J]. 山东大学学报(理学版), 2015, 50(10):1-12. SHI Kaiquan. P-augmented matrix and dynamic intelligent discovery-identification of information[J]. Journal of Shandong University(Natural Science), 2015, 50(10):1-12.
[24] LIN Hongkang, FAN Chengxian. Embedding camouflage of inverse P-information and application[J]. International Journal of Convergence Information and Technology, 2012, 7(20):471-480.
[25] FAN Chengxian, HUANG Shunliang. Inverse P-reasoning discovery identification of inverse P-information[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(20):735-744.
[26] ZHANG Ling, REN Xuefang, SHI Kaiquan, et al. Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J]. Microsystem Technologies, 2018, 24(10):4415-4421.
[27] REN Xuefang, ZHANG Ling, SHI Kaiquan, et al. Inverse P-augmented matrix method-based the dynamic findings of unknown information[J]. Microsystem Technologies, 2018, 24(10):4187-4192.
[28] ZHANG Ling, REN Xuefang, SHI Kaiquan. Inverse P-information law models and the reality-camouflage intelligent transformations of information image[C] //Proceedings of the 2016 International Conference on Network and Information Systems for Computers. Washington:IEEE, 2016: 337-341.
[29] 任雪芳, 张凌, 史开泉. 基数余-亏与逆 P-增广矩阵[J] ,山东大学学报(理学版), 2015, 50(10): 13-18, 26. REN Xuefang, ZHANG Ling, SHI Kaiquan. Surplus-deficiency of cardinal number and inverse P-augmented matrices[J]. Journal of Shandong University(Natural Science), 2015, 50(10): 13-18, 26.
[30] 张凌,任雪芳. 基数余-亏定理与数据外-内挖掘-分离[J]. 山东大学学报(理学版), 2015, 50(8):90-94. ZHANG Ling, REN Xuefang. Surplus-deficient theorem of cardinal number and data internal-outer mining-separation[J]. Journal of Shandong University(Natural Science), 2015, 50(8):90-94.
[31] 任雪芳,张凌,史开泉.逆P-集合的边界特征与系统状态监测[J]. 计算机科学, 2016,43(10): 211-213,255. REN Xuefang, ZHANG Ling, SHI Kaiquan. Boundary characteristics of inverse P-sets and system condition monitoring[J]. Computer Science, 2016,43(10): 211-213, 255.
[32] 任雪芳,张凌.逆P-集合的扰动定理与数据的扰动挖掘[J]. 山东大学学报(理学版), 2016, 51(12): 54-60. REN Xuefang, ZHANG Ling. Perturbation theorems of inverse P-sets and perturbation-based data mining[J]. Journal of Shandong University(Natural Science), 2016, 51(12): 54-60.
[33] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
[34] MENEZES A J, VANSTONE S A. Elliptic curve cryptosystems and their implementation[J]. J Cryptology, 1993, 6(4):209-224.
[35] 史开泉,赵建立.函数S-粗集与隐藏规律安全认证[J]. 中国科学: E辑, 2008, 38(8):1234-1243. SHI Kaiquan, ZHAO Jianli. Function S-rough sets and security-authentication of hiding law[J]. Scinence in China: E, 2008, 38(8):1234-1243.
[36] SHI Kaiquan, ZHAO Jianli. Function S-rough sets and security-authentication of hiding law[J]. Science in China Series F: Information Sciences, 2008, 51(7):924-935.
[1] Jia-qi WANG,Mu-yun YANG,Tie-jun ZHAO,Zhen-yu ZHAO. Construction of retrieval dataset of procuratorate legal documents [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(7): 81-87.
[2] LING Mi-ran, MI Ju-sheng, MA Li. Heterogeneous formal contexts for uncertainty reasoning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 28-32.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!