[1] |
SHAMELI-SENDI A , CHERIET M , HAMOU-LHADJ A . Taxonomy of intrusion risk assessment and response system[J]. Elsevier Computers & Security, 2014,45(3): 1-16.
|
[2] |
TSAI H , HUANG Y . An analytic hierarchy process-based risk assessment method for wireless networks[J]. IEEE Transactions on Reliability, 2011,60(4): 801-816.
|
[3] |
张义荣, 鲜明, 王国玉 . 一种基于网络熵的计算机网络攻击效果定量评估方法[J]. 通信学报, 2004,25(11): 158-165.
|
|
ZHANG Y R , XIAN M , WANG G Y . A quantitative evaluation technique of computer network based on network entropy[J]. Journal on Communications, 2004,25(11): 158-165.
|
[4] |
LI C , CHEN K , XIANG X . An integrated framework for effective safety management evaluation:application of an improved grey clustering measurement[J]. Elsevier Expert Systems with Applications, 2015,42(13): 5541-5553.
|
[5] |
GAO C , MA J , LIU Z ,et al. An approach to quality assessment for Web service selection based on the analytic hierarchy process for cases of incomplete information[J]. Springer Science China Information Sciences, 2015,58(12):122102.
|
[6] |
ALALI M , ALMOGREN A , HASSAN M ,et al. Improving risk assessment model of cyber security using fuzzy logic inference system[J]. Elsevier Computers & Security, 2018,74: 323-339.
|
[7] |
SAMANTRA C , DATTA S , MAHAPATRA S . Risk assessment in IT outsourcing using fuzzy decision-making approach:an Indian perspective[J]. Elsevier Expert Systems with Applications, 2014,41(8): 4010-4022.
|
[8] |
RASHIDI B , FUNG C , BERTINO E . Android resource usage risk assessment using hidden markov model and online learning[J]. Elsevier Computers & Security, 2017,65: 90-107.
|
[9] |
SEN A , MADRIA S . Risk assessment in a sensor cloud framework using attack graphs[J]. IEEE Transactions on Services Computing, 2017,PP(99): 1-1.
|
[10] |
杨豪璞, 邱辉, 王坤 . 面向多步攻击的网络安全态势评估方法[J]. 通信学报, 2017,38(1): 187-198.
|
|
YANG H P , QIU H , WANG K . Network security situation evaluation method for multi-step attack[J]. Journal on Communications, 2017,38(1): 187-198.
|
[11] |
黄亮, 冯登国, 连一峰 ,等. 基于神经网络的DDoS防护绩效评估[J]. 计算机研究与发展, 2013,50(10): 2100-2108.
|
|
HUANG L , FEGN D G , LIANG Y F ,et al. Artificial-neural -networkbased DDoS defense effectiveness evaluation[J]. Journal of Computer Research and Development, 2013,50(10): 2100-2108.
|
[12] |
黄亮, 冯登国, 连一峰 ,等. 一种基于多属性决策的DDoS防护措施遴选方法[J]. 软件学报, 2015,26(7): 1742-1756.
|
|
HUANG L , FEGN D G , LIANG Y F ,et al. Method of DDoS countermeasure selection based on multi-attribute decision making[J]. Journal of Software, 2015,26(7): 1742-1756.
|
[13] |
KUBLER S , ROBERT J , DERIGENT W ,et al. A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications[J]. Elsevier Expert Systems with Applications, 2016,65: 398-422.
|
[14] |
XIE K , NING X , WANG X ,et al. Recover corrupted data in sensornetworks:a matrix completion solution[J]. IEEE Transactions on Mobile Computing, 2017,PP(99): 1-1.
|