[1] |
JAJODIA S , ALBANESE M . An integrated framework for cyber situation awareness[M]// Theory and Models for Cyber Situation Awareness. Berlin:Springer, 2017: 29-46.
|
[2] |
LUKTARHAN N , JIA X , HU L . Multi-stage attack detection algorithm based on hidden Markov model[C]// International Conference on Web Information Systems and Mining. Springer, 2012: 275-282.
|
[3] |
罗世亮, 程良伦 . 面向复杂工业环境的信息物理融合系统可靠性[J]. 北京理工大学学报, 2015,35(9): 973-979.
|
|
LUO S L , CHENG L L . Reliability research on cyber-physical systems for the complicated industrial environment[J]. Transactions of Beijing Institute of Technology, 2015,35(9): 973-979.
|
[4] |
席荣荣, 云晓春, 张永铮 . 一种改进的网络安全态势量化评估方法[J]. 计算机学报, 2015,38(4): 749-758.
|
|
XI R R , YUN X C , ZHANG Y Z . An improved quantitative evaluation method for network security[J]. Chinese Journal of Computers, 2015,38(4): 749-758.
|
[5] |
邢云菲, 栾春玉 . 一种改进的对入侵容忍系统的容忍度量化分析[J]. 情报科学, 2015,33(8): 55-58,78.
|
|
XING Y F , LUAN C Y . A quantitative analysis and detection of intrusion tolerance system model[J]. Information Science, 2015,33(8): 55-58,78.
|
[6] |
刘进 . 基于高分子链的入侵容忍系统病毒吸附算法[J]. 科技通报, 2014(10): 103-105.
|
|
LIU J . Virus adsorption optimization algorithm of intrusion tolerance system based on polymer chain[J]. Bulletin of Science and Technology, 2014(10): 103-105.
|
[7] |
徐晓斌, 张光卫, 王尚广 . 基于群体信任的 WSN 异常数据过滤方法[J]. 通信学报, 2014,35(5): 108-117.
|
|
XU X B , ZHANG G W , WANG S G . Abnormal date filtering approach based on collective trust for WSN[J]. Journal on Communications, 2014,35(5): 108-117.
|
[8] |
孙蔚 . 基于网管系统的分布式入侵检测模型研究[J]. 电子设计工程, 2014,22(1): 165-167.
|
|
SUN W . Research of distributed intrusion detection based on network management system[J]. Electronic Design Engineering, 2014,22(1): 165-167.
|
[9] |
DIVYA T , MUNIASAMY K . Real-time intrusion prediction using hidden Markov model with genetic algorithm[M]// Artificial intelligence and evolutionary algorithms in engineering systems.Berlin:Springer, 2015: 731-736.
|
[10] |
KHOLIDY H A , ERRADI A , ABDELWAHED S ,et al. A finite state hidden markov model for predicting multistage attacks in cloud systems[C]// IEEE 12th International Conference on Dependable,Autonomic and Secure Computing. IEEE, 2014: 14-19.
|
[11] |
HOLGADOP , VILLAGRA V A , VAZQUEZ L . Real-time multistep attack prediction based on Hidden Markov models[J]. IEEE Transactions on Dependable & Secure Computing, 2017,PP(99):1.
|
[12] |
AHMADIAN R A , RASOOLZADEGAN A , JAVAN J A . A systematic review on intrusion detection based on the hidden Markov model[J]. Statistical Analysis and Data Mining:The ASA Data Science Journal, 2018,11(3): 111-134.
|
[13] |
王笑, 戚湧, 李千目 . 基于时变加权马尔可夫链的网络异常检测模型[J]. 计算机科学, 2017,44(9): 136-14.
|
|
WANG X , QI Y , LI Q M . Network anomaly detection model based on time-varying weighted Markov chain[J]. Computer Science, 2017,44(9): 136-14.
|
[14] |
TRIVEDI K S . Probability and statistics with reliability queuing ,and computer science applications[M]. 2nd ed. New York: John Wiley and SonsPress, 2002.
|
[15] |
魏柯, 张帆 . 基于马尔可夫的网络容忍入侵能力评估建模[J]. 计算机仿真, 2016,33(7): 289-292.
|
|
WEI K , ZHANG F . Based on Markov network tolerate invasion ability evaluation model[J]. Computer Simulation, 2016,33(7): 289-292.
|
[16] |
罗智勇, 尤波, 刘嘉辉 . 基于半马尔可夫的入侵容忍状态转移系统研究[J]. 北京理工大学学报, 2016,36(7): 712-717.
|
|
LUO Z Y , YOU B , LIU J H . Research of the intrusion tolerance state transition system based on semi-Markov[J]. Transactions of Beijing Institute of Technology, 2016,36(7): 712-717.
|