[1] |
DANDURAND L , SERRANO O S . Towards improved cyber security information sharing[Z]. 2013.
|
[2] |
刘春年, 张凌宇 . 应急信息可信度研究范式的三维阐释与构建——基于工程化思维与 WSR 方法论[J]. 现代情报, 2017,37(6): 24-30.
|
|
LIU C N , ZHANG L Y . Three dimensional interpretation and construction of emergency information credibility research paradigm_based on engineering thinking and WSR methodology[J]. Journal of Modern Information, 2017,37(6): 24-30.
|
[3] |
贺雅琪 . 多源异构数据融合关键技术研究及其应用[D]. 成都:电子科技大学, 2018.
|
|
HE Y Q . Research and applications on the key technology of multi-source heterogeneous data fusion[D]. Chengdu:University of Electronic Science and Technology of China, 2018.
|
[4] |
徐留杰, 翟江涛, 杨康 ,等. 一种多源网络安全威胁情报采集与封装技术[J]. 网络安全技术与应用, 2018(10): 23-26.
|
|
XU L J , ZHAI J T , YANG K ,et al. A multi-source network security threat information collection and packaging technology[J]. Network Security Technology & Application, 2018(10): 23-26.
|
[5] |
MOHAISEN A,AL-IBRAHIM O , KAMHOUA C ,et al. Re-thinking information sharing for threat intelligence[Z]. 2017.
|
[6] |
STHONNARD O , DACIER M . Actionable knowledge discov-ery for threats intelligence support using a multi-dimensional data mining methodology[Z]. 2008.
|
[7] |
QAMAR S , ANWAR Z , RAHMAN M A ,et al. Data-driven analytics for cyber-threat intelligence and information shar-ing[J]. Computers & Security, 2017(67): 35-58.
|
[8] |
侯艳芳, 王锦华 . 基于自更新威胁情报库的大数据安全分析方法[J]. 电信科学, 2018,34(3): 56-64.
|
|
HOU Y F , WANG J H . Big data security analysis method based on self-update threat intelligence database[J]. Telecommunications Science, 2018,34(3): 56-64.
|
[9] |
李蕾 . 网络空间中威胁情报可信度多维度分析模型研究[D]. 北京:北京邮电大学, 2018.
|
|
LI L . Study on the multi-dimensional analysis model of threat intelligence credibility in cyberspace[D]. Beijing:Beijing University of Posts and Telecommunications, 2018.
|
[10] |
BOU-HARB E , LUCIA W , FORTI N ,et al. Cyber meets control:a novel federated approach for resilient cps leveraging real cyber threat intelligence[J]. IEEE Communications Magazine, 2017: 2-8.
|
[11] |
SERKETZIS N , KATOS V , ILIOUDIS C ,et al. Actionable threat intelligence for digital forensics readiness[J]. Information& Computer Security, 2019,27(2).
|
[12] |
方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1): 1-5.
|
|
FANG B X . Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-5.
|