defense strategy
Recently Published Documents


TOTAL DOCUMENTS

467
(FIVE YEARS 178)

H-INDEX

28
(FIVE YEARS 5)

2022 ◽  
Vol 22 (3) ◽  
pp. 1-20
Author(s):  
Zhihan Lv ◽  
Ranran Lou ◽  
Haibin Lv

Nowadays, with the rapid development of intelligent technology, it is urgent to effectively prevent infectious diseases and ensure people's privacy. The present work constructs the intelligent prevention system of infectious diseases based on edge computing by using the edge computing algorithm, and further deploys and optimizes the privacy information security defense strategy of users in the system, controls the cost, constructs the optimal conditions of the system security defense, and finally analyzes the performance of the model. The results show that the system delay decreases with the increase of power in the downlink. In the analysis of the security performance of personal privacy information, it is found that six different nodes can maintain the optimal strategy when the cost is minimized in the finite time domain and infinite time domain. In comparison with other classical algorithms in the communication field, when the intelligent prevention system of infectious diseases constructed adopts the best defense strategy, it can effectively reduce the consumption of computing resources of edge network equipment, and the prediction accuracy is obviously better than that of other algorithms, reaching 83%. Hence, the results demonstrate that the model constructed can ensure the safety performance and forecast accuracy, and achieve the best defense strategy at low cost, which provides experimental reference for the prevention and detection of infectious diseases in the later period.


2021 ◽  
Vol 4 (2) ◽  
pp. 204-216
Author(s):  
Ahmad Fauzi Imanuddin ◽  
Sugito Sugito

The South China Sea conflict has involved many parties, including the Philippines. In defending one of the most strategic islands, the Spratly Islands, the Philippines has exerted its hard power by increasing its military power strategy. By engaging the Armed Forces of the Philippines (AFP) and working with the U.S., the Philippines can increase its military power. The prior studies have only explored how the dispute in SCS is caused by maritime growth, and some have found the effective way to solve the issue is from the liberal perspective. This study uses a power politics approach to the Philippines' strategy to defend the Spratly Islands and its surroundings in the South China Sea dispute. It analyzes the Philippines' interests in the Spratly islands. The research was conducted using qualitative methods through literature study, and the data were analyzed, then described to obtain a complete picture of the answers to the problems studied. This finding explores how the Philippines' defense strategy works and how it is generated. The results of this study indicate that the defense strategy in the Spratly Islands is generated by the national interests of the Philippines, especially in the economic field.


2021 ◽  
Vol 1 (12) ◽  
pp. 918-932
Author(s):  
Muhammad Achyar ◽  
I Wayan Midhio ◽  
Khaerudin Khaerudin

The purpose of this study is to analyze the strategies and constraints of Indonesia's defense policy in responding to the development of China's military base construction in the South China Sea. Data obtained through literature study and interviews with informants, then analyzed using qualitative methods. The results of this study can be concluded that Indonesia's current defense strategy has not been concretely described and the problems found in the formulation of Indonesian policies have yet to be found a solution because there are still egos and differences in interests among policy makers, the solution requires commitment from the Ministry of Defense, TNI Headquarters, and Main Command to faithfully adhere to execute all planning and road map that were prepared together.


2021 ◽  
Vol 9 ◽  
Author(s):  
Rong Fu ◽  
Jie Chen ◽  
Xiaofei Zhang ◽  
Jie Zhang

Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Yanhua Liu ◽  
Hui Chen ◽  
Hao Zhang ◽  
Ximeng Liu

Evolutionary game theory is widely applied in network attack and defense. The existing network attack and defense analysis methods based on evolutionary games adopt the bounded rationality hypothesis. However, the existing research ignores that both sides of the game get more information about each other with the deepening of the network attack and defense game, which may cause the attacker to crack a certain type of defense strategy, resulting in an invalid defense strategy. The failure of the defense strategy reduces the accuracy and guidance value of existing methods. To solve the above problem, we propose a reward value learning mechanism (RLM). By analyzing previous game information, RLM automatically incentives or punishes the attack and defense reward values for the next stage, which reduces the probability of defense strategy failure. RLM is introduced into the dynamic network attack and defense process under incomplete information, and a multistage evolutionary game model with a learning mechanism is constructed. Based on the above model, we design the optimal defense strategy selection algorithm. Experimental results demonstrate that the evolutionary game model with RLM has better results in the value of reward and defense success rate than the evolutionary game model without RLM.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yuwen Zhu ◽  
Lei Yu ◽  
Houhua He ◽  
Yitong Meng

Network defenders always face the problem of how to use limited resources to make the most reasonable decision. The network attack-defense game model is an effective means to solve this problem. However, existing network attack-defense game models usually assume that defenders will no longer change defense strategies after deploying them. However, in an advanced network attack-defense confrontation, defenders usually redeploy defense strategies for different attack situations. Therefore, the existing network attack-defense game models are challenging to accurately describe the advanced network attack-defense process. To address the above challenges, this paper proposes a defense strategy selection method based on the network attack-defense wargame model. We model the advanced network attack-defense confrontation process as a turn-based wargame in which both attackers and defenders can continuously adjust their strategies in response to the attack-defense posture and use the Monte Carlo tree search method to solve the optimal defense strategy. Finally, a network example is used to illustrate the effectiveness of the model and method in selecting the optimal defense strategy.


Author(s):  
Adhit Prayoga ◽  

As an arena of hegemonic war between China and the United States of America (USA), Indo-Pacific has economic value that can increase conflict in the region. This hegemonic war then cultivated rapidly, as evidenced by the expanded issue through the involvement of other countries such as France, Germany, and England. This research basically examined the actions of Indonesia as a non-claimant country in conducting defense strategy to prevent threats that can disrupt its territory, especially in the North Natuna Sea which is adjacent to the South China Sea as the main theater of this hegemonic war in Indo-Pacific. This study was analysed using qualitative method, descriptive analysis and neorealism perspective. As an effort to maintain territorial sovereignty, especially in the North Natuna Sea which is close to South China Sea, Indonesia had done several defense strategies which can be categorized as internal and external balancing. Internal balancing consists of relocation process of fishermen from North Coast of Java to Natuna, increasing trend of defense budget and particular allocation for the security of North Natuna Sea, and execution of combat exercise. External balancing includes cooperation of joint exercises and national defense industry quality improvement through transfer of technology and knowledge, joint development, as well as acquisitions.


Author(s):  
O. I. Kalinin

Metaphor in modern linguistics is understood not only as a means of decorating speech, but also as a means of structuring, transforming and creating new knowledge, evoking emotions, influencing the perception. The article aims to estimate the potential speech impact of the military doctrines’ texts with the help of the metaphor power quantitative index. The methodology is based on calculating the indices of metaphor density (MDI), intensity (MII) and functionality of metaphors in the text (MfPI). The theoretical basis of the research is the conceptual metaphor theory by J. Lakoff and M. Johnson, as well as ideas about the metaphor power and the potential persuasiveness of metaphors in the text and discourse, most fully presented in the works on meta-analysis of the metaphor speech impact by P. Sopory and S. van Stee. Thus, we assume that the higher the density of metaphors in the text, the higher is the per-suasiveness of the given speech message. Metaphors of different intensity are based on two different cognitive mechanisms, namely, categorization and comparison, and affect the recipient in different ways, since they are perceived differently by him. Conventional metaphors tend to have a so-called cognitive effect, and new “creative” metaphors, in turn, may have a considerable emotional impact. Different types of metaphors also have different functions: orientational metaphors perform a descriptive function, ontological metaphors are used to explain (translate) complex objects and phenomena, identifying them in the mind of recipients, structural metaphors serve the purpose of restructuring the signified (le signifié in terms of Saussure) of an object or phenomenon, changing the recipient’s point of view on the subject. The material under study includes the latest published doctrinal military documents – the Military Doctrine of the Russian Federation (2014), the White Paper “China’s Defense in the New Era” (2019), and a Summary of the US National Defense Strategy (2020). The empiric results of the study show that the metaphor power of the Chinese text in comparison with American English and Russian is higher in terms of the density and intensity of the metaphors used, which indicates the intention to make the White Paper more convincing and emotionally affecting. “The US National Defense Strategy” is less saturated with novel metaphors, but at the same time it uses a greater number of structural metaphors, which indicates the intention to produce a cognitive declarative impact rather than emotional effect. The text of the Russian Military Doctrine has the lowest indices of the density and intensity of metaphors; the number of structural metaphors found in it was also the smallest, which leads us to conclude that this document highlights the informative function, having the identifying nature. The method of metaphor power analysis proposed and tested in this study allows us to single out two different types of speech impact – emotional and cognitive –, as well as makes it possible to express quantitatively their degree. In addition, the values of the metaphorical indices can be used to specify the genre and style of texts under study.


Sign in / Sign up

Export Citation Format

Share Document