Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 8. Отображено 8.
11-08-2023 дата публикации

Automatic testing method based on IOS system

Номер: CN116578488A
Принадлежит:

The invention discloses an automatic testing method based on an IOS system, and relates to the field of software testing, which comprises the following steps: S1, Windows system equipment is in communication connection with tested equipment, the Windows system equipment is used as a Client end, and the tested equipment is an ISO system; s2, the Client end obtains related information of the tested equipment through the basic information of the IOS system; s3, the server side is installed by the Client side according to the related information to serve as an IOS system of the tested equipment; s4, the Client side displays that the tested equipment is online; s5, the Client side sends a test task to the server side; s6, the server side executes the test task according to the details of the test task, collects test result data after the test is completed, and returns the test result data to the Client side; and the Client end and the server end realize communication between the windows system ...

Подробнее
06-06-2023 дата публикации

DPDK-based flow acquisition asymmetrical homologous and homoclinic method

Номер: CN116233023A
Принадлежит:

The invention discloses a DPDK-based flow acquisition asymmetrical homologous and homoclinic method, which relates to the field of network flow acquisition, and comprises the following steps: S1, respectively accessing uplink flow and downlink flow to be acquired into network ports at two ends of a dual-port network card of acquisition equipment; s2, initializing a DPDK operation environment, and configuring network ports at two ends as packet capture interfaces; s3, initializing configuration of network ports at two ends; s4, configuring N packet capturing threads; s5, starting a packet capture program, and traversing each receiving queue obtained on the dual-port network card by a packet capture thread through a DPDK packet capture interface; respectively starting M receiving queues on a dual-port network card accessed with asymmetric flow, configuring symmetric Hash to ensure that data packets of the same two-tuple or five-tuple are distributed to the same queue, equally dividing the ...

Подробнее
23-06-2023 дата публикации

Plug-in association scheduling method based on topological sorting

Номер: CN116302156A
Принадлежит:

The invention discloses a plug-in association scheduling method based on topological sorting, which relates to the technical field of computers, and comprises the following steps: S1, dividing plug-ins into integration plug-ins and business plug-ins; s2, obtaining a service plug-in needing to be loaded; s3, obtaining all integrated plug-ins dependent on each business plug-in from each business plug-in to construct a mapping relation; s4, creating a mapping table, and importing the mapping relation into the mapping table; s5, traversing each mapping relation in the mapping table, creating directed edges, and connecting all the directed edges to finally form a directed acyclic graph; s6, sorting the generated directed acyclic graphs according to a topological sorting algorithm; s7, forward traversing a topological sorting result to obtain registration information, and constructing a plug-in scheduling chain table; s8, reversely traversing a topological sorting result, and initializing each ...

Подробнее
21-07-2023 дата публикации

Intranet domain asset identification method and device based on traffic statistical characteristics

Номер: CN116471097A
Принадлежит:

The invention discloses an intranet domain asset identification method and device based on traffic statistical characteristics. The method comprises the following steps: S1, acquiring traffic data of an intranet domain; s2, performing standardization processing, filtering processing and preprocessing on the flow data in sequence to obtain useful data; s3, screening and filtering the useful data based on the source IP and the target IP to obtain first asset information and second asset information; s4, combining the first asset information and the second asset information to obtain intranet domain asset information; according to the technical scheme of the invention, the flow data is subjected to pre-filtering and the like, then the source IP and the target IP are screened and filtered through the corresponding identification conditions based on the communication protocol, and the intranet domain assets are identified to obtain the asset data information, so that the accuracy of the identification ...

Подробнее
22-08-2023 дата публикации

Mail sending path and sending IP extraction method based on frontier mail service data

Номер: CN116633670A
Принадлежит:

The invention discloses a mail sending path and sending IP extraction method based on frontier mail service data, and relates to the field of mail analysis, and the method comprises the steps: S1, obtaining a mail header of a to-be-tested mail; s2, detecting an origin IP field and a Received field of a mail header; s3, analyzing whether an origin IP field and a Received field exist or not, and if the origin IP field and the Received field both exist, entering S4; if only the origin IP field exists, going to S5; if only the Received field exists, going to S6; if the sending path and the sending IP do not exist, the sending path and the sending IP are empty; s4, analyzing the relationship between the origin IP field and the Received field, and determining a sending path and a sending IP; s5, analyzing related information of the source IP field, and determining a sending path and a sending IP, S6, the sending path is a path formed by upward combination of the Received field, and the sending ...

Подробнее
23-06-2023 дата публикации

APT attack judgment and analysis method based on connected subgraphs

Номер: CN116319008A
Принадлежит:

The invention relates to an APT (Advanced Persistent Threat) attack judgment and analysis method based on a connected subgraph, which comprises the following steps of: extracting attack source information of an attack behavior from an attack event, constructing an attack source relationship network, and calculating to obtain an attack source value integrating the organizational property and the hostile property of an attack source; extracting attack object information of the attack behavior from the attack event, constructing an attack object relationship network, and calculating to obtain an attack object value integrating the importance and directionality of an attack object; an APT attack element graph is constructed through the attack behaviors, the attack source relation graph and the attack object relation graph, and the attack behavior value integrating the attack behavior cost and the harmfulness is obtained through calculation; and obtaining a final evaluation value of the attack ...

Подробнее
11-08-2023 дата публикации

High-speed data query method and system based on continuous memory

Номер: CN116578589A
Принадлежит:

The invention relates to a high-speed data query method based on a continuous memory, which constructs an overall balanced binary tree realized by an index on a logic continuous memory address structure through a mode of combining index nodes and index offset, breaks the limitation brought by a method of using a pointer to carry out data connection at present, and improves the data query efficiency. And the purpose of inter-process high-speed sharing is achieved. According to the method, the relationship among all the nodes is represented by the index and the offset, so that the problem of memory sharing caused by different memory addresses among the processes is perfectly solved; a double linked list algorithm realized by an index is used as an idle node management structure, and unused memory blocks are directly reused, so that the memory overhead for managing idle addresses is greatly saved; in the query process, due to the fact that the overall balanced binary tree achieved through ...

Подробнее
09-06-2023 дата публикации

TTL-based man-in-the-middle hijacking position detection method

Номер: CN116248379A
Принадлежит:

The invention discloses a TTL-based man-in-the-middle hijacking position detection method, and belongs to the field of hijacking position detection. The method comprises the steps that S1, two network ports of a server serve as a mirror image network port and a packet sending network port respectively; s2, capturing the flow of a mirror port, detecting hijacking, and entering S3 if the hijacking exists; s3, constructing an ICMP request data packet, and sending the ICMP request data packet through a packet sending network port; s4, constructing a detection flow data packet; the TCP is hijacked to S5; hijacking the UDP to S6; s5, copying SYN data packet information, sending the SYN data packet information through a packet sending network port, completing handshake for three times, extracting a TCP data request load, packaging a TCP request message, sending the TCP request message through the packet sending network port, and entering S7; s6, copying a UDP request data packet, extracting a ...

Подробнее