[1] |
张焕国, 韩文报, 来学嘉 , 等. 网络空间安全概述[J]. 中国科学:信息科学, 2016,46(2):125-164.
|
|
ZHANG H G , HAN W B , LAI X J , et al. Survey on cyberspace se-curity[J]. Scientia Sinica Informations, 2016,46(2):125-164.
|
[2] |
A system for reliable large-scale log collection[EB/OL]. .
|
[3] |
JONGHOON K . PsyBoG: a scalable botnet detection method for large-scale DNS traffic[J]. Computer Networks, 2016,97(14):48-73.
|
[4] |
KIRUBAVATHI G , ANITHA R . Botnet detection via mining of traffic flow characteristics[J]. Computers & Electrical Engineering, 2016,50:91-101.
|
[5] |
ZHANG Y , An adaptive flow counting method for anomaly detection in SDN[C]// The 9th ACM Conference on Emerging Networking Ex-periments and Technologies. 2013:25-30.
|
[6] |
王威, 方滨兴, 崔翔 . 基于终端行为特征的IRC僵尸网络检测[J]. 计算机学报, 2009,32(10):1980-1988.
|
|
WANG W , FANG B X , CUI X . IRC botnet detection based on host behavior[J]. Chinese Journal of Computers, 2009,32(10):1980-1988.
|
[7] |
BHANDARI P , GUJRAL M S . Ontology based approach for per-ception of network security state[C]// Recent Advances in En-gineering and Computational Sciences (RAECS). 2014:1-6.
|
[8] |
G′ OMEZ-P′EREZ A , FERN′ANDEZ-L′OPEZ M , CORCHO O . Ontological engineering[M]// Metasynthetic Computing and Engi-neering of Complex System. Berlin: Springer, 2004.
|
[9] |
GUARINO N . Formal ontology and information systems[C]// FOIS'98. 1998:3-15.
|
[10] |
FRANK A U . Spatial ontology: a geographical information point of view[M]. Berlin: Springer, 1997.
|
[11] |
ARANGO G , WILLIAMS G , ISCOE N . Domain modeling for software engineering[C]// The 13th International Conference on Software Engineering. 1991:340-343.
|
[12] |
GRUBER T R . A translation approach to portable ontologies[J]. Knowledge Acquisition, 1993,5(2):199-220.
|
[13] |
BORST W N . Construction of engineering ontologies for knowl-edge sharing and reuse[D]. Enschede: University Twente, 1997.
|
[14] |
AVIZIENIS A , LAPRIE J C , RANDELL B , et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans. Dependable Sec. Computer, 2004,1(1):11-33.
|
[15] |
LANDWEHR C E , BULL A R , MCDERMOTT J P , et al. A tax-onomy of computer program security flaws[J]. ACM Computer Survay, 1994,26(3):211-254.
|
[16] |
Owl Web ontology language[EB/OL]. .
|
[17] |
The protege ontology editor and knowledge acquisition system[EB/OL]. .
|
[18] |
GRUBER T R . A translation approach to portable ontology specifi-cation[J]. International Journal Human-Computer Studies, 1993,43:907-928.
|