[1] |
吴迪, 连一峰, 陈恺 ,等. 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报, 2012,35(6): 1938-1950.
|
|
WU D , LIAN Y F , CHEN K ,et al. A security threats identification and analysis method based on attack graph[J]. Chinese Journal of Computers, 2012,35(6): 1938-1950.
|
[2] |
田志宏, 余翔湛, 张宏莉 ,等. 基于证据推理网络的实时网络入侵取证方法[J]. 计算机学报, 2014,37(5): 1184-1194.
|
|
TIAN Z H , YU X Z , ZHANG H L ,et al. A real-time intrusion forensics method based on evidence reasoning network[J]. Chinese Journal of Computer, 2014,37(5): 1184-1194.
|
[3] |
ALHAZMI O H , MALAIYA Y K , RAY I . Measuring,analyzing and predicting security vulnerabilities in software systems[J]. Computers& Security, 2007,26(3): 219-228.
|
[4] |
HANNES H , MATHIAS E , DENNIS A . Empirical analysis of system-level vulnerability metrics through actual attacks[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(6): 825-837.
|
[5] |
ENDSLEY M R , . Design and evaluation for situation awareness enhancement[C]// The Human Factors Society 32nd Annual Meeting. 1988: 97-101.
|
[6] |
BASS T . Intrusion detection systems & multisensory data fusion:creating cyberspace situational awareness[J]. Communications of the ACM, 2000,43(4): 99-105.
|
[7] |
陈秀真, 郑庆华, 管晓宏 ,等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006,17(4): 885-997.
|
|
CHEN X Z , ZHENG Q H , GUAN X H ,et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006,17(4): 885-997.
|
[8] |
韦勇, 连一峰, 冯登国 . 基于信息融合的网络安全态势评估模型[J]. 计算机研究与发展, 2009,46(3): 353-362.
|
[9] |
MIRMOEINI F , KRISHNAMURTHY V . Reconfigurable Bayesian networks for hierarchical multi-stage situation assessment in battlespace[C]// The 39th Asilomar Conference on Signals,Systems and Computers. 2005
|
[10] |
徐晓辉, 刘作良 . 基于 D-S 证据理论的态势评估方法[J]. 电光与控制, 2005,12(5): 36-37.
|
|
XU X H , LIU Z L . A method for situation assessment based on D-S evidence theory[J]. Electronics Optics & Control, 2005,12(5): 36-37.
|
[11] |
ZHUO Y , ZHANG Q , GONG Z H . Network situation assessment based on RST[C]// Pacific-Asia Workshop on Computational Indulgence and Industrial Application. 2008: 502-506.
|
[12] |
ZHOU Y , ZHANG Q , GONG Z H . Research and implementation of network transmission situation awareness[C]// WRI World Congress on Computer Science and Information Engineering. 2009: 210-214.
|
[13] |
张勇, 谭笑彬, 崔孝林 ,等. 基于 Markov 博弈模型的网络安全态势感知方法[J]. 软件学报, 2011,22(3): 495-508.
|
|
ZHANG Y , TAN X B , CUI X L ,et al. Network security situation awareness approach based on markov game model[J]. Journal of Software, 2011,22(3): 495-508.
|
[14] |
YEE W , TANSU A , MARIMUTHU P . Security games for risk minization in automatic generation control[J]. IEEE Transactions on Power Systems, 2015,30(1): 223-232.
|
[15] |
吕慧颖, 彭武, 王瑞梅 ,等. 基于时空关联分析的网络安全实时威胁识别与评估[J]. 计算机研究与发展, 2014,51(5): 1039-1049.
|
|
LYU H Y , PENG W , WANG R M ,et al. A real-time network threat recognition and assessment method based on association analysis of time and space[J]. Journal of Computer Research and Development, 2014,51(5): 1039-1049.
|
[16] |
CYRIL O , THOMAS O . Situational awareness in computer network defense principles,methods and applications[M]. Hershey: IGI Global SnippetPress, 2012
|
[17] |
SCHIFFMAN M . Common vulnerability scoring system version 2.0[EB/OL]. .
|
[18] |
FATEMEH K , BEHZAD A . Automatic learning of attack behavior patterns using Bayesian networks[C]// 6th International Symposium on Telecommunications (IST’2012). 2012: 999-1004
|
[19] |
MIT LINCOLN LABORATORY. 2000 DARPA intrusion detection scenario specific data sets[EB/OL]. .
|
[20] |
DEFCON Capture the flag traffic dump[EB/OL]. .
|