[1] |
王长杰, 李志华, 张叶 . 一种针对恶意软件家族的威胁情报生成方法[J]. 信息网络安全, 2020,20(12): 83-90.
|
|
WANG C J , LI Z H , ZHANG Y . A threat intelligence generation method for malware family[J]. Netinfo Security, 2020,20(12): 83-90.
|
[2] |
陈剑锋, 范航博 . 面向网络空间安全的威胁情报本体化共享研究[J]. 通信技术, 2018,51(1): 171-177.
|
|
CHEN J F , FAN H B . Ontological threat intelligence sharing in cyberspace security[J]. Communications Technology, 2018,51(1): 171-177.
|
[3] |
陈明, 王乔保, 汤文峤 . 网络空间安全战略情报保障能力研究[J]. 情报杂志, 2020,39(4): 127-131.
|
|
CHEN M , WANG Q B , TANG W Q . The capability of strategic intelligence supporting for cyberspace security[J]. Journal of Intelligence, 2020,39(4): 127-131.
|
[4] |
徐锐, 陈剑锋, 刘方 . 网络空间安全威胁情报及应用研究[J]. 通信技术, 2016,49(6): 758-763.
|
|
XU R , CHEN J F , LIU F . Research on cyber threat intelligence and applications[J]. Communications Technology, 2016,49(6): 758-763.
|
[5] |
徐留杰, 翟江涛, 杨康 ,等. 一种多源网络安全威胁情报采集与封装技术[J]. 网络安全技术与应用, 2018(10): 23-26.
|
|
XU L J , ZHAI J T , YANG K ,et al. A multi-source network se-curity threat intelligence collection and packaging technology[J]. Network Security Technology & Application, 2018(10): 23-26.
|
[6] |
朱薏 . 计算机网络安全分层评价防护体系的构建与应用研究[J]. 大众标准化, 2020(24): 50-51.
|
|
ZHU Y . Research on the construction and application of hierar-chical evaluation and protection system for computer network security[J]. Popular Standardization, 2020(24): 50-51.
|
[7] |
吴仲 . 计算机网络安全风险评价及防范措施探析[J]. 电子技术与软件工程, 2015(19): 216.
|
|
WU Z . Computer network security risk assessment and analysis of preventive measures[J]. Electronic Technology & Software Engineering, 2015(19): 216.
|
[8] |
黄欣 . 计算机网络安全威胁与防范措施[J]. 产业与科技论坛, 2011,10(5): 95-96.
|
|
HUANG X . Computer network security threats and precau-tions[J]. Industrial & Science Tribune, 2011,10(5): 95-96.
|
[9] |
林晨希, 薛丽敏, 韩松 . 浅析网络安全威胁情报的发展与应用[J]. 网络安全技术与应用, 2016(6): 12-13,15.
|
|
LIN C X , XUE L M , HAN S . A brief analysis of the development and application of cybersecurity threat intelligence[J]. Network Security Technology & Application, 2016(6): 12-13,15.
|
[10] |
王晓周, 乔喆, 李雨昂 ,等. 基础电信企业网络安全威胁情报工作思路探讨[J]. 电信工程技术与标准化, 2018,31(12): 7-12.
|
|
WANG X Z , QIAO Z , LI Y A ,et al. Discussion on cyber secu-rity threat intelligence work of telecom operators[J]. Telecom Engineering Technics and Standardization, 2018,31(12): 7-12.
|
[11] |
刘俊博, 马博克 . 网络安全模糊风险评价方法与应用[J]. 网络安全技术与应用, 2020(5): 3-4.
|
|
LIU J B , MA B K . Network security fuzzy risk assessment me-thod and application[J]. Network Security Technology & Ap-plication, 2020(5): 3-4.
|
[12] |
董聪, 姜波, 卢志刚 ,等. 面向网络空间安全情报的知识图谱综述[J]. 信息安全学报, 2020,5(5): 56-76.
|
|
DONG C , JIANG B , LU Z G ,et al. Knowledge graph for cy-berspace security intelligence:a survey[J]. Journal of Cyber Security, 2020,5(5): 56-76.
|
[13] |
林玥, 刘鹏, 王鹤 ,等. 网络安全威胁情报共享与交换研究综述[J]. 计算机研究与发展, 2020,57(10): 2052-2065.
|
|
LIN Y , LIU P , WANG H ,et al. Overview of threat intelligence sharing and exchange in cybersecurity[J]. Journal of Computer Research and Development, 2020,57(10): 2052-2065.
|
[14] |
黄克振, 连一峰, 冯登国 ,等. 基于区块链的网络安全威胁情报共享模型[J]. 计算机研究与发展, 2020,57(4): 836-846.
|
|
HUANG K Z , LIAN Y F , FENG D G ,et al. Cyber security threat intelligence sharing model based on blockchain[J]. Jour-nal of Computer Research and Development, 2020,57(4): 836-846.
|
[15] |
尹立君 . 基于大数据下的网络安全威胁感知决策指挥系统设计[J]. 邯郸职业技术学院学报, 2020,33(1): 63-66,90.
|
|
YIN L J . Design of network security threat perception decision command system based on big data[J]. Journal of Handan Poly-technic College, 2020,33(1): 63-66,90.
|
[16] |
肖俊芳 . 网络安全威胁情报概述[J]. 保密科学技术, 2016(6): 12-15.
|
|
XIAO J F . Cybersecurity threat intelligence overview[J]. Secrecy Science and Technology, 2016(6): 12-15.
|