[1] |
MCQUEEN M A , MCQUEEN T A , BOYER W F ,et al. Empirical estimates and observations of 0day vulnerabilities[C]// 2009 42nd Hawaii International Conference on System Sciences. 2009.
|
[2] |
ZHANG S , CARAGEA D , OU X . An empirical study on using the national vulnerability database to predict software vulnerabilities[C]// Database and Expert Systems Applications-22nd International Conference, 2011.
|
[3] |
WANG L , JAJODIA S , SINGHAL A ,et al. k-zero day safety:measuring the security risk of networks against unknown attacks[J]. Lecture Notes in Computer Science, 2010,11(1): 573-587.
|
[4] |
WANG L , JAJODIA S , SINGHAL A ,et al. k-zero day safety:a network security metric for measuring the risk of unknown vulnerabilities[J]. IEEE Transactions on Dependable & Secure Computing, 2014,11(1): 30-44.
|
[5] |
ALBANESE M , JAJODIA S , SINGHAL A ,et al. An efficient framework for evaluating the risk of zero-day vulnerabilities[C]// International Conference on E-Business and Telecommunications. 2013.
|
[6] |
YANG Y U , XIA C H , XIAO-YUN H U , ,et al. An augmented 0-day attack graph generation method[J]. DEStech Transaction on Computer Science and Engineering, 2016(aice-ncs).
|
[7] |
叶子维 . 基于漏洞与攻击图的网络脆弱性分析关键技术研究[D]. 郑州:信息工程大学, 2019.
|
|
YE Z W . Research on key technology of network weakness analysis based on vulnerability and attack graph[D]. Zhengzhou:Information Engineering University, 2019.
|
[8] |
AHMADINEJAD S H , JALILI S , ABADI M . A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs[J]. Computer Networks, 2011,55(9): 2221-2240.
|
[9] |
SUN X , DAI J , LIU P ,et al. Towards probabilistic identification of zero-day attack paths[C]// 2016 IEEE Conference on Communications and Network Security (CNS). 2016.
|
[10] |
SUN X , DAI J , LIU P ,et al. Using bayesian networks for probabilistic identification of zero-day attack paths[J]. IEEE Transactions on Information Forensics and Security, 2018: 1-10.
|
[11] |
SUN X , DAI J , LIU P ,et al. Using bayesian networks to fuse intrusion evidences and detect zero-day attack paths[M]. Network Security Metrics. 2017.
|
[12] |
SINGH U K , JOSHI C , KANELLOPOULOS D . A framework for zero-day vulnerabilities detection and prioritization[J]. Journal of Information Security and Applications, 2019,46: 164-172.
|
[13] |
杨峻楠, 张红旗, 张传富 . 基于不完全信息随机博弈的防御决策方法[J]. 网络与信息安全学报, 2018,4(8): 12-20.
|
|
YANG J N , ZHANG H Q , ZHANG C F . Defense decision-making method based on incomplete information stochastic game[J]. Chinese Journal of Network and Information Security, 2018,4(8): 12-20.
|
[14] |
冷强, 杨英杰, 常德显 ,等. 面向网络实时对抗的动态防御决策方法[J]. 网络与信息安全学报, 2019,5(6): 58-66.
|
|
LENG Q , YAGN Y J , CHANG D X ,et al. Dynamic defense decision method for network real-time confrontation[J]. Chinese Journal of Network and Information Security, 2019,5(6): 58-66.
|
[15] |
LAO N , COHEN W W . Relational retrieval using a combination of path-constrained random walks[J]. Machine Learning, 2010,81(1): 53-67.
|
[16] |
AMIT S . Introducing the knowledge graph:things,not strings[EB].
|
[17] |
LI A . A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018,4(1): 53-60.
|
[18] |
尚怀军 . 面向漏洞库的网安知识库构建技术的研究与实现[D]. 长沙:国防科技大学, 2018.
|
|
SHANG H J . Research and implementation oftechniqueonconstructionofcybersecurityknowledgebaseforvulnerabilitydatabase[D]. Chagnsha:National University of Defense Technology, 2018.
|
[19] |
谢敏容 . 网络防御知识图谱构建技术研究与实现[D]. 成都:电子科技大学, 2020.
|
|
XIE M R . Research and implementation of cybersecurity knowledge graph construction technology[D]. Chengdu:University of Electronic Science and Technology of China, 2020.
|
[20] |
SAHOO S S , HALB W , HELLAMNN S ,et al. A survey of current approaches for mapping of relational databases to RDF[R]. W3C RDB2RDF Incubator Group Report,2009, 1: 113-130.
|
[21] |
LIN Y , SHEN S , LIU Z ,et al. Neural relation extraction with selective attention over instances[C]// Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics. 2016.
|
[22] |
司成 . 基于本体的网络威胁态势推演与评估技术研究[D]. 郑州:信息工程大学, 2015.
|
|
SI C . Research onnetworkthreatsituationdeductionandevaluationtechnologybasedonontology[D]. Zhengzhou:Information Engineering University, 2015.
|
[23] |
LAO N , MITCHELL T M , COHEN W W . Random walk inference and learning in alarge scale knowledge base[C]// Conference on Empirical Methods in Natural Language Processing. DBLP, 2011.
|