[1] |
张淑英 . 网络安全事件关联分析与态势评测技术研究[D]. 长春:吉林大学, 2012.
|
|
ZHANG S Y . Research on correlation analysis and situation evaluation technology of network security events[D]. Changchun:Jilin University, 2012.
|
[2] |
CUPPENS F , MIEGE A . Alert correlation in a cooperative intrusion detection framework[C]// Proceedings of 2002 IEEE symposium on Security and privacy, 2002: 202-215.
|
[3] |
ZANG Y C , ZHOU T Y , GE X Y ,et al. An improved attack path discovery algorithm through compact graph planning[J]. IEEE Access, 2019,99:1.
|
[4] |
LI K , ZHOU H , TU Z ,et al. Cskb:a cyber security knowledge base based on knowledge graph[C]// Proceedings of First International Conference on Security and Privacy in Digital Economy(SPDE 2020). 2020: 100-113.
|
[5] |
SYED Z , PADIA A , FININ T ,et al. UCO:a unified cybersecurity ontology[C]// Proceedings of AAAI Workshop on Artificial Intelligence for Cyber Security. 2016: 14-22.
|
[6] |
孙澄, 胡浩, 杨英杰 ,等. 基于网络防御知识图谱的 0day 攻击路径预测方法[J]. 网络与信息安全学报, 2022,8(1): 151-166.
|
|
SUN C , HU H , YANG Y J ,et al. Prediction method of 0day attack path based on cyber defense knowledge graph[J]. Chinese Journal of Network and Information Security, 2022,8(1): 151-166.
|
[7] |
WANG H , ZHANG F , WANG J ,et al. Ripplenet:propagating user preferences on the knowledge graph for recommender systems[C]// Proceedings of the 27th ACM International Conference on Information and Knowledge. 2018: 417-426.
|
[8] |
WANG X , WANG D , XU C ,et al. Explainable reasoning over knowledge graphs for recommendation[C]// Proceedings of the AAAI Conference on Artificial Intelligence. 2019: 5329-5336.
|
[9] |
RENDLE S , FREUDENTHALER C , GANTNER Z ,et al. BPR:Bayesian personalized ranking from implicit feedback[C]// Proceedings of UAI 2009. 2009: 452-461.
|
[10] |
ZHANG F , YUAN N J , LIAN D ,et al. Collaborative knowledge base embedding for recommender systems[C]// Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016: 353-362.
|
[11] |
ZHAO H , YAO Q , LI J ,et al. Meta-graph based recommendation fusion over heterogeneous information networks[C]// Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2017: 635-644.
|
[12] |
徐增林, 盛泳潘, 贺丽荣 ,等. 知识图谱技术综述[J]. 电子科技大学学报, 2016,45(4).
|
|
XU Z L , SHENG Y P , HE L R ,et al. Overview of knowledge graph technology[J]. Journal of University of Electronic Science and Technology, 2016,45(4).
|
[13] |
ZHOU X , ZHU Q , LIU P ,et al. Learning knowledge embeddings by combining limit-based scoring loss[C]// Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 2017: 1009-1018.
|
[14] |
李忠伟, 高东, 刘昕 ,等. 基于知识图谱的海洋数值预报数据推荐算法[J]. 计算机工程与设计, 2023,44(5).
|
|
LI Z W , GAO D , LIU X ,et al. Recommendation algorithm of marine numerical forecast data based on knowledge graph[J]. Computer Engineering and Design, 2023,44(5).
|
[15] |
RANI U , BIDHAN K . Comparative assessment of extractive summarization:TextRank,TF-IDF and LDA[J]. Journal of Scientific Research, 2021(1).
|
[16] |
GB/T 20986-2023. 信息安全技术 网络安全事件分类分级指南[S].
|
|
GB/T 20986-2023. Information security technology-classification of cyber security incidents[S].
|