Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Node risk assessment fusing ICT supply chain network topology and product business information

A technology of network topology and business information, which is applied in the field of node risk assessment, can solve problems such as incomplete assessment methods, and achieve the effect of perfect evaluation index system and high evaluation accuracy

Pending Publication Date: 2020-08-04
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to propose an ICT supply chain that comprehensively considers the ICT supply chain network topology information, supplier node product information, and supplier node business information in view of the current ICT supply chain network security risk assessment model index system and incomplete assessment methods. Network node security risk assessment model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node risk assessment fusing ICT supply chain network topology and product business information
  • Node risk assessment fusing ICT supply chain network topology and product business information
  • Node risk assessment fusing ICT supply chain network topology and product business information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to better illustrate the purpose and advantages of the present invention, the implementation of the method of the present invention will be further described in detail below in conjunction with examples.

[0022] The experimental data comes from the National Enterprise Credit Information Publicity System and the websites of various bidding platforms, including 2043 pieces of enterprise data. Split the training set and test set at a ratio of 2:1.

[0023] The following is a detailed introduction to the quantitative processing method of the 11-dimensional index.

[0024] 1. Enterprise type: The enterprise type is a single state-owned or listed company, and the quantitative assignment is 0.5; the enterprise type includes two types of state-owned and listed companies, and the quantitative assignment is 1;

[0025] 2. Registered capital: Normalize the registered capital of all companies, and the processing formula is:

[0026]

[0027] 3. Establishment date: Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to node risk assessment fusing ICT supply chain network topology and product business information, and belongs to the technical field of computer and information science. The invention is mainly used for solving the problem that an ICT supply chain network security risk assessment index system and an assessment method are incomplete. To solve the problem, the invention provides an ICT supply chain network node security risk assessment model which comprehensively considers ICT supply chain network topology information, supplier node product information and supplier node business information. The method comprises the following steps: firstly, quantizing 11-dimensional indexes; then, training the quantitative indexes through an ensemble learning stacking model; and finally, testing an output node security risk level and an F1 value by using the trained three-classification ensemble learning staging model. Experiments are carried out on an ICT bidding and tendering project data set, and a supplier node security risk rating task reaches a higher F1 value, which indicates that the supply chain network node security risk comprehensive evaluation method can well realize comprehensive evaluation of the supply chain network node security risk.

Description

technical field [0001] The invention relates to a node risk assessment that integrates ICT supply chain network topology and product business information, and belongs to the field of computer and information science and technology. Background technique [0002] With the maturity of information and communication technology, ICT products, systems, and services are gradually becoming key elements that affect the normal operation of governments and key industries. The United States, Russia, the European Union and other countries and regions generally recognize the importance of strengthening ICT supply chain security management, and gradually include ICT supply chain security in their national strategies. Due to the late start of the entire ICT industry in my country, research on ICT supply chain security issues is crucial to the implementation of my country's cyberspace security strategy. [0003] On the one hand, the role of supplier node risk assessment is to conduct correla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06K9/62
CPCG06Q10/0635G06Q10/06393G06F18/241
Inventor 罗森林董勃吴舟婷潘丽敏吴倩
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products