[1] |
IBM security.IBM 2015 cyber security intelligence index[R]. IBM, 2015.
|
[2] |
CARDENAS A A , MANADHATA P K , RAJAN S . Big data analytics for security[J]. IEEE Security&Privacy, 2013, (11/12): 74-76.
|
[3] |
RORY W , BETSY B , PARK Y , et al BeyondCorp:a new approach to enterprise security[J].Login, 2014, 39(6): 6-11.
|
[4] |
JAY J . Data driven security:analysis,visualization and dashboards[M]. Indianapolis:John Wiley and Sons, 2014.
|
[5] |
Splunk Inc. Using splunk user behavior analytics[R]. Splunk, 2015.
|
[6] |
启明星辰 . 基于大数据分析的安全管理平台技术研究及应用[EB/OL]. . 2014.
|
|
Venustech . Study and application of information security manage-ment platform based on big data[EB/OL]. . 2014.
|
[7] |
瀚思 . 数据驱动安全[EB/OL]. . 2015.
|
|
Hansight . Data driven security[EB/OL]. . 2015.
|
[8] |
张焕国, 韩文报, 来学嘉 , 等. 网络空间安全综述[J]. 中国科学, 2016, 46(2): 125-164.
|
|
ZHANG H G , HAN W B , LAI X J . Survey on cyberspace secu-rity[J]. Science China, 2016, 46(2): 125-164
|
[9] |
ENDSLEY M R . Toward a theory of situation awareness in dy-namic systems[J]. Human Factors, 1995, 37(1): 32-64.
|
[10] |
尤马彦 . 网络安全态势评估技术的研究与实现[D], 广东工业大学, 2012.
|
|
YOU M Y . Research and implementation of network security situa-tion assessment technology[D]. Guangzhou:Guangdong University of Technology, 2012.
|
[11] |
王志平 . 基于指标的网络安全态势评估研究[D]. 国防科学技术大学, 2010.
|
|
WANG Z P . Network security situation assessment research based on the index[D]. Changsha:National University of Defense Tech-nology, 2010.
|
[12] |
杨光, 马建刚, 于爱民 , 等. 内部威胁检测研究[J], 信息安全学报, 2016, 1(3): 21-36.
|
|
YNAG G , MA J G , YU A M , et al. The internal threat detection study[J]. Journal of Information Security, 2016, 1(3): 21-36.
|
[13] |
NURSE J R C , BUCKLEY O , LEGG P A , et al. Under-standing insider threat:a framework for characterising attacks[C]// IEEE Symposium on Workshop on Research for Insider Threat, IEEE Computer Society Security&Privacy. c2014: 215-228.
|
[14] |
AZARIA A , RICHARDSON A , KRAUS S , et al. Behavioral analy-sis of insider threat:a survey and boot-strapped prediction in im-balanced data[J]. IEEE Transactions on Computational Social Sys-tems, 2014, 1(2): 135-155.
|
[15] |
JAKOBSON G , BUFORD J , LEWIS L . A framework of cognitive situation modeling and recognition[C]// 2006 IEEE Military Com-munications Conference. c2006: 1-7.
|
[16] |
Elastic search site[EB/OL]. .
|
[17] |
Kafka site[EB/OL]. .
|
[18] |
CATTELL R . Scalable SQL and NoSQL data stores[J]. Sigmod Rec, 2011, 39(4): 12-27.
|
[19] |
HDF site[EB/OL]. .
|
[20] |
HIVE site[EB/OL]. .
|
[21] |
Spark site[EB/OL]. .
|
[22] |
ZAHARIA M , CHOWDHURY M , DAS T , et al. Resilient distrib-uted datasets:a fault-tolerant abstraction for in-memory cluster computing[C]// The 9th USENIX Conference on Networked Sys-tems Design and Implementation. c2012.
|