[1] |
LIN H Q , YAN Z , CHEN Y ,et al. A survey on network security-related data collection technologies[C]// Proceedings of IEEE Access. 2018: 18345-18365.
|
[2] |
XIE H M , YAN Z , YAO Z ,et al. Data collection for security measurement in wireless sensor networks:a survey[J]. IEEE Internet of Things Journal, 2019,6(2): 2205-2224.
|
[3] |
ZHOU D H , YAN Z , FU Y L ,et al. A survey on network data collection[J]. Journal of Network and Computer Applications, 2018,116: 9-23.
|
[4] |
JING X Y , YAN Z , PEDRYCZ W . Security data collection and data analytics in the Internet:a survey[J]. IEEE Communications Surveys & Tutorials, 2019,21(1): 586-618.
|
[5] |
LIU G , YAN Z , PEDRYCZ W . Data collection for attack detection and security measurement in mobile Ad Hoc networks:a survey[J]. Journal of Network and Computer Applications, 2018,105: 105-122.
|
[6] |
庞希愚, 姜波, 仝春玲 ,等. 一种自适应数据变化规律的数据采集算法[J]. 计算机技术与发展, 2013,23(2): 157-161.
|
|
PANG X Y , JIANG B , TONG C L ,et al. A kind of data acquisition algorithm of adaptive data change rule[J]. Computer Technology and Development, 2013,23(2): 157-161.
|
[7] |
杨明霞, 王万良, 邵鹏飞 . 基于时间序列的自适应采样机制策略研究[J]. 计算机科学, 2015,42(7): 162-164,181.
|
|
YANG M X , WANG W L , SHAO P F . Adaptive sampling algorithm based on TCP congestion strategy[J]. Computer Science, 2015,42(7): 162-164,181.
|
[8] |
曾文序, 库少平, 郑浩 . 基于旋转门算法的自适应变频数据采集策略[J]. 计算机应用研究, 2018,35(3): 769-772.
|
|
ZENG W X , KU S P , ZHENG H . Strategy of self-adaptive frequency conversion data acquisition based on swing door trending algorithm[J]. Application Research of Computers, 2018,35(3): 769-772.
|
[9] |
LIN H Q , YAN Z , FU Y L . Adaptive security-related data collection with context awareness[J]. Journal of Network and Computer Applications, 2019,126: 88-103.
|
[10] |
陈雷 . 基于数据聚合的无线传感器网络主动管理机制研究[D]. 长沙:湖南大学, 2011.
|
|
CHEN L . Research of initiative management scheme for sensor networks based on data aggregation[D]. Changsha:Hunan University, 2011.
|
[11] |
CHEN L W , PENG Y H , TSENG Y C ,et al. Cooperative sensing data collection and distribution with packet collision avoidance in mobile long-thin networks[J]. Sensors (Basel,Switzerland), 2018,18(10): 3588.
|
[12] |
SAFARA F , SOURI A , SERRIZADEH M . Improved intrusion detection method for communication networks using association rule mining and artificial neural networks[J]. IET Communications, 2020,14(7): 1192-1197.
|
[13] |
章坚武, 黄佳森, 周迪 . 基于模糊理论与关联规则的入侵检测模型[J]. 电信科学, 2019,35(5): 59-69.
|
|
ZHANG J W , HUANG J S , ZHOU D . Intrusion detection model based on fuzzy theory and association rules[J]. Telecommunications Science, 2019,35(5): 59-69.
|
[14] |
王慧, 王宇, 邵翀 . 网络入侵检测中群关联模型的设计与分析[J]. 中国人民公安大学学报(自然科学版), 2018,24(4): 74-77.
|
|
WANG H , WANG Y , SHAO C . Design and analysis of group association model in network intrusion detection[J]. Journal of People's Public Security University of China (Science and Technology), 2018,24(4): 74-77.
|
[15] |
HU W , LI J , CHENG J ,et al. Security monitoring of heterogeneous networks for big data based on distributed association algorithm[J]. Computer Communications, 2020,152: 206-214.
|
[16] |
NGUYEN M T . Distributed compressive and collaborative sensing data collection in mobile sensor networks[J]. Internet of Things, 2020,9: 100156.
|
[17] |
SHA C , SONG D D , YANG R ,et al. A type of energy-balanced tree based data collection strategy for sensor network with mobile sink[J]. IEEE Access, 2019,7: 85226-85240.
|
[18] |
DOUDOU M , DJENOURI D , BARCELO-ORDINAS J M ,et al. Cost effective node deployment strategy for energy-balanced and delay-efficient data collection in wireless sensor networks[C]// Proceedings of 2014 IEEE Wireless Communications and Networking Conference (WCNC). 2014: 2868-2873.
|
[19] |
SARNO R , SINAGA F , SUNGKONO K R . Anomaly detection in business processes using process mining and fuzzy association rule learning[J]. Journal of Big Data, 2020,7:5.
|
[20] |
郭涛敏 . 基于轻量化关联规则挖掘的安全日志审计技术研究[J]. 现代电子技术, 2019,42(15): 83-85,90.
|
|
GUO T M . Research on security log audit technology based on lightweight association rules mining[J]. Modern Electronics Technique, 2019,42(15): 83-85,90.
|
[21] |
PAN D W , LIU D T , ZHOU J ,et al. Anomaly detection for satellite power subsystem with associated rules based on Kernel Principal Component Analysis[J]. Microelectronics Reliability, 2015,55(9/10): 2082-2086.
|
[22] |
B?HMER K , RINDERLE-MA S , . Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users[J]. Information Systems, 2020,90: 101438
|
[23] |
李凤华, 李子孚, 李凌 ,等. 复杂网络环境下面向威胁监测的采集策略精化方法[J]. 通信学报, 2019,40(4): 49-61.
|
|
LI F H , LI Z F , LI L ,et al. Collection policy refining method for threat monitoring in complex network environment[J]. Journal on Communications, 2019,40(4): 49-61.
|