[1] |
BERNERS-LEE T , HENDLER J , LASSILA O . The semantic Web[J]. Scientific American, 2001,284(5): 28-37.
|
[2] |
BERNERS-LEE T , CHEN Y , CHILTON L ,et al. Tabulator:exploring and analyzing linked data on the semantic Web[C]// The 3rd International Semantic Web User Interaction Workshop. 2006.
|
[3] |
POULOVASSILIS A , WOOD P T . Combining approximation and relaxation in semantic Web path queries[M]// The Semantic Web-ISWC 2010. Berlin Heidelberg: SpringerPress, 2010: 631-646.
|
[4] |
MCCRAE J , SPOHR D , CIMIANO P . Linking lexical resources and ontologies on the semantic Web with lemon[M]// The Semantic Web:Research and Applications. Berlin Heidelberg: SpringerPress, 2011: 245-259.
|
[5] |
BIRKHOLZ H , SIEVERDINGBECK I , SOHR K ,et al. IO:an interconnected asset ontology in support of risk management processes[C]// The 7th International Conference on Availability,Reliability and Security (ARES). 2012: 534-541.
|
[6] |
GRANADILLO G G , MUSTAPHA Y B , HACHEM N ,et al. An ontology-based model for siem environments[M]// Global Security,Safety and Sustainability & e-Democracy. Berlin Heidelberg: SpringerPress, 2012: 148-155.
|
[7] |
KOTENKO I , POLUBELOVA O , SAENKO I . The ontological approach for siem data repository implementation[C]// 2012 IEEE International Conference on Green Computing and Communications. 2012: 761-766.
|
[8] |
DEVERGARA J E L,VILLAGRá V A , HOLGADO P , et al . A semantic Web approach to share alerts among security information management systems[M]// Web Application Security. Berlin Heidelberg: SpringerPress, 2010: 27-38.
|
[9] |
EKELHART A , FENZ S , KLEMEN M ,et al. Security ontologies:improving quantitative risk analysis[C]// International Conference on System Sciences. 2007 :156a.
|
[10] |
AHMAD S , MORTEZA A . Predicting network attacks using ontology-driven inference[J]. International Journal of Information and Communication Technology, 2013,4(9):13.
|
[11] |
RAZZAQ A , ANWAR Z , AHMAD H F ,et al. Ontology for attack detection:an intelligent approach to Web application security[J]. computers & security, 2014,45: 124-146.
|
[12] |
YU L , WU S Z , GUO T ,et al. Ontology model-based static analysis of security vulnerabilities[M]// Information and Communications Security. Berlin Heidelberg : Springer Press, 2011: 330-344.
|
[13] |
MENG Y L , YIN G S , WANG H Q . Study on the ontology modeling method of Heterogeneous security data integration[J]. Computer Engineering and Applications, 2010,46(19): 138-140.
|
[14] |
BIDOU R . Security operation center concepts & implementation[EB/OL]. .
|
[15] |
YUAN S , ZOU C . The security operations center based on correlation analysis[C]// International Conference on Communication Software and Networks (ICCSN). 2011: 334-337.
|
[16] |
ZHANG D , ZHANG D . The analysis of event correlation in security operations center[C]// International Conference on Intelligent Computation Technology and Automation (ICICTA). 2011(2): 1214-1216.
|
[17] |
KOTENKO I , POLUBELOVA O , SAENKO I . The ontological approach for siem data repository implementation[C]// Green Computing and Communications (GreenCom). 2012:761-766.
|
[18] |
KUMAR G , KUMAR K . Network security-an updated perspective[J]. Systems Science & Control Engineering:An Open Access Journal, 2014,2(1): 325-334.
|
[19] |
KAUR A , SALUJA M . Study of network security along with network security tools and network simulators[J]. International Journal of Computer Science & Information Technologies, 2014,5(1): 88-92.
|
[20] |
BEJTLICH R . The practice of network security monitoring:understanding incident detection and response[M]. No Starch Press, 2013: 100-120.
|
[21] |
ANAND V , . Intrusion detection:tools,techniques and strategies[C]// The 2014 ACM Siguccs Annual Conference on User Services. 2014: 69-73.
|
[22] |
SUNDARAMURTHY S C , CASE J , TRUONG T ,et al. A tale of three security operation centers[C]// The 2014 ACM Workshop on Security Information Workers. 2014: 43-50.
|