[1] |
杨毅宇, 周威, 赵尚儒 ,等. 物联网安全研究综述:威胁、检测与防御[J]. 通信学报, 2021,42(8): 188-205.
|
|
YANG Y Y , ZHOU W , ZHAO S R ,et al. Survey of IoT security research:threats,detection and defense[J]. Journal on Communications, 2021,42(8): 188-205.
|
[2] |
张方哲 . 物联网安全态势感知系统的研究与实现[D]. 济南:山东大学, 2021.
|
|
ZHANG F Z . Research and implementation of Internet of things security situation awareness system[D]. Jinan:Shandong University, 2021.
|
[3] |
龚俭, 臧小东, 苏琪 ,等. 网络安全态势感知综述[J]. 软件学报, 2017,28(4): 1010-1026.
|
|
GONG J , ZANG X D , SU Q ,et al. Survey of network security situation awareness[J]. Journal of Software, 2017,28(4): 1010-1026.
|
[4] |
简玲, 叶天鹏, 林祥 ,等. 多源融合的大数据网络安全态势感知平台研究与探索[J]. 信息网络安全, 2020,(S2).
|
|
JIAN L , YE T P , LIN X ,et al. Research and exploration of multi-source fusion on big data network security situation awareness platform[J]. Netinfo Security, 2020,(S2).
|
[5] |
LIVIA M B . An approach for information security risk assessment in cloud environments[J]. Informatica Economica Journal, 2020,24(4): 29-40.
|
[6] |
ZENONAS T , NIKOLAJ Gn , ASSEL Na ,et al. Information security risk assessment in critical infrastructure:a hybrid MCDM approach[J]. Informatica. 2019,30(1): 187-211.
|
[7] |
黄亭亭 . 水电工程洪水灾害链态势推演和应急决策的研究[D]. 武汉:华中科技大学, 2017.
|
|
HUANG T T . Research on emergency situation evolution and emergency decision making for flood disaster chain of hydropower project construction[D]. WuHan:Huazhong University of Science and Technology, 2017.
|
[8] |
BENAVOLI A , RISTIC B , FARINA A ,et al. An application of evidential networks to threat assessment[J]. IEEE Transactions on Aerospace and Electronic Systems, 2009,45(2): 620-639.
|
[9] |
LIAO Y W , ZHAO G S , WANG J ,et al. Network security situation assessment model based on extended hidden markov[J]. Mathematical Problems in Engineering. 2020.
|
[10] |
HAN Z , LI X , HUANG K ,et al. A software defined network based security assessment framework for cloud IoT[J]. IEEE Internet of Things Journal. 2018,5(3): 1424-1434.
|
[11] |
魏青梅, 李宇博, 应雨龙 . 结合 Dempster-Shafer 证据理论与循环神经网络的网络安全态势预测[J]. 济南大学学报(自然科学版). 2020,34(3): 238-246.
|
|
WEI Q M , LI Y B , YING L Y . Network security situation prediction based on Dempster-Shafer evidence theory and recurrent neural network[J]. Journal of University of Jinan(Science and Technology). 2020,34(3): 238-246.
|
[12] |
PAN Z , WU Y . Building and testing network security situational awareness model based on bayesian method[C]// Third International Conference on Cyberspace Technology(CCT 2015). 2015: 1-4.
|
[13] |
张欢, 陆见光, 唐向红 . 面向冲突证据的改进 DS 证据理论方法[J]. 北京航空航天大学学报, 2020,46(3): 616-623.
|
|
ZHANG H , LU J G , TANG X H . An improved DS evidence theory algorithm for conflict evidence[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020,46(3): 616-623.
|
[14] |
LO H W , LIOU J J H . Comments on “factors influencing medical tourism adoption in malaysia:a DEMATEL-fuzzy TOPSIS approach”[J]. Computers & Industrial Engineering, 2021,157.
|
[15] |
邓勇, 施文康, 朱振福 . 一种有效处理冲突证据的组合方法[J]. 红外与毫米波学报. 2004,23(1): 27-32.
|
|
DENG Y , SHI W K , ZHU Z F . Efficient combination approach of conflict evidence[J]. Journal of Infrared and Millimeter Waves. 2004,23(1): 27-32.
|
[16] |
奚婷婷, 熊伟丽, 张林 ,等. 基于矩阵分析的 DS 合成算法[J]. 计算机工程, 2009,35(16): 264-266.
|
|
XI T T , XIONG W L , ZHANG L ,et al. DS compositive algorithm based on matrix analysis[J]. Computer Engineering, 2009,35(16): 264-266.
|
[17] |
秦涛, 鲁冬林, 曾拥华 . 基于D-S理论的分队级BDR能力指标评估模型研究[J]. 中国设备工程, 2021,(9): 153-155.
|
|
QIN T , LU D L , ZENG Y H . Research on unit level BDR capability index evaluation model based on D-S Theory[J]. China Plant Engineering, 2021,(9): 153-155.
|