[1] |
QU Z Y , LI Y Y , LI P . A network security situation evaluation method based on D-S evidence theory[C]// Environmental Science and Information Application Technology (ESIAT). 2010: 496-499.
|
[2] |
吕慧颖, 彭武, 王瑞梅 . 基于时空关联分析的网络实时威胁识别与评估[J]. 计算机研究与发展, 2014,51(5): 1039-1049.
|
|
LYU H Y , PENG W , WANG R M ,et al. A real-time network threat recognition and assessment method based on association analysis of time and space[J]. Journal of Computer Research and Development, 2014,51(5): 1039-1049.
|
[3] |
席荣荣, 云晓春, 张永铮 ,等. 一种改进的网络安全态势量化评估方法[J]. 计算机学报, 2015,38(4): 749-758.
|
|
XI R R , YUN X C , ZHANG Y Z ,et al. An improved quantitative evaluation method for network security[J]. Chinese Journal of Computers, 2015,38(4): 749-758.
|
[4] |
杨豪璞, 邱辉, 王坤 . 面向多步攻击的网络安全态势评估方法[J]. 通信学报, 2017,38(1): 187-198.
|
|
YANG H P , QIU H , WANG K . Network security situation evaluation method for multi-step attack[J]. Journal on Communications, 2017,38(1): 187-198.
|
[5] |
刘玉岭, 冯登国, 连一峰 ,等. 基于时空维度分析的网络安全态势预测方法[J]. 计算机研究与发展, 2014,51(8): 1681-1694.
|
|
LIU Y L , FENG D G , LIAN Y F ,et al. Network situation prediction method based on spatial-time dimension analysis[J]. Journal of Computer Research and Development, 2014,51(8): 1681-1694.
|
[6] |
LING L J , SU L , WANG H F ,et al. An ARIMA-ANN hybrid model for time series forecasting[J]. Systems Research And Behavioral Science, 2013,30(3): 1092-7026.
|
[7] |
GE P , WANG J , REN P ,et al. A new improved forecasting method integrated fuzzy time series with the exponential smoothing method[J]. International Journal of Environment and Pollution, 2013,51(3/4): 206-221.
|
[8] |
彭武, 胡昌振, 姚淑萍 ,等. 基于时间自动机的入侵意图动态识别方法[J]. 计算机研究与发展, 2011,48(7): 1288-1297.
|
|
PENG W , HU C Z , YAO S P ,et al. A dynamic intrusive intention recognition method based on timed automata[J]. Journal of Computer Research and Development, 2011,48(7): 1288-1297.
|
[9] |
陈小军, 方滨兴, 谭庆丰 ,等. 基于概率攻击图的内部攻击意图推断算法研究[J]. 计算机学报, 2014,37(1): 62-72.
|
|
CHEN X J , FANG B X , TAN Q F ,et al. Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014,37(1): 62-72.
|
[10] |
LIU S , LIU Y . Network security risk assessment method based on HMM and attack graph model[C]// IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,NETWORKING and Parallel/distributed Computing. 2016: 517-522.
|
[11] |
FREDJ O B . A realistic graph based alert correlation system[J]. Security & Communication Networks, 2015,8(15): 2477-2493.
|
[12] |
DAI F , HU Y , ZHENG K ,et al. Exploring risk flow attack graph for security risk assessment[J]. IET Information Security, 2015,9(6): 344-353.
|
[13] |
ABRAHAM S , NAIR S . A predictive framework for cyber security analytics using attack graphs[J]. International Journal of Computer Networks & Communications, 2015,7(1): 1-17.
|
[14] |
GHASEMIGOL M , GHAEMI B A , TAKABI H . A comprehensive approach for network attack forecasting[J]. Computers & Security, 2016,58: 83-105.
|
[15] |
WANG Y , LI J , MENG K ,et al. Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets[J]. Security & Communication Networks, 2013,6(1): 89-99.
|
[16] |
张勇, 谭小彬, 崔孝林 ,等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011,22(3): 495-508.
|
|
ZHANG Y , TAN X B , CUI X L ,et al. Network security situation awareness approach based on Markov game model[J]. Journal of Software, 2011,22(3): 495-508.
|
[17] |
CHEN G , SHEN D , KWAN C ,et al. Game theoretic approach to threat prediction and situation awareness[C]// International Conference on Information Fusion. 2006: 1-8.
|
[18] |
WU J , OTA K , DONG M ,et al. Big data analysis based security situational awareness for smart grid[J]. IEEE Transactions on Big Data, 2016,doi:10.1109/TBDATA.2016.2616146.
|
[19] |
SERRA E , JAJODIA S , PUGLIESE A ,et al. Pareto-optimal adversarial defense of enterprise systems[J]. ACM Transactions on Information & System Security, 2015,17(3): 11.
|
[20] |
MELL P , SCARFONE K , ROMAMOSKY S . Common vulnerability scoring system[J]. IEEE Security & Privacy, 2007,4(6): 85-89.
|
[21] |
OU X , GOVINDAVAJHALAS , APPEL A W . MulVAL:a logic-based network security analyzer[C]// 14th USENIX Security Symposium. 2005.
|