Yanfang HOU,Jinhua WANG. Big data security analysis method based on self-update threat intelligence database[J]. Telecommunications Science, 2018, 34(3): 50-58.
ZHANG F , XIE F , JIANG X . Survey on the visualization technologies of threatening security data in cyber space[J]. Chinese Journal of Network and Information Security, 2018,4(2):34-39.
[2]
方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1):1-5.
FANG B X . cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1):1-5.
[3]
ISLAM J , XU K , WONG W . Analytic provenance for criminal intelligence analysis[J]. Chinese Journal of Network and Information Security, 2018,4(2):18-33.
[4]
MITNICK K D , SIMON W L . 欺骗的艺术[M]. 潘爱民,译. 北京: 清华大学出版社 2014.
MITNICK K D , SIMON W L . The art of deception[M].Translated by PAN A M. Beijing: Tsinghua University Press 2014.
[5]
张云勇 . 电信运营商大数据发展建议[J]. 电信科学, 2018,34(1):103-108.
ZHANG Y Y . Suggestions for telecom operators' big data development[J]. Telecommunications Science, 2018,34(1):103-108.