[1] |
ENDSLEY M R . Design and evaluation for situation awareness enhancement[J]. Proceedings of the Human Factors Society Annual Meeting, 1988,32(2): 97-101.
|
[2] |
ENDSLEY M R . Toward a theory of situation awareness in dynamic systems[J]. Human Factors:the Journal of the Human Factors and Ergonomics Society, 1995 37(1): 32-64.
|
[3] |
ENDSLEY M R . Measurement of situation awareness in dynamic systems[J]. Human Factors:the Journal of the Human Factors and Ergonomics Society, 1995 37(1): 65-84.
|
[4] |
BASS T , . Multisensor data fusion for next generation distributed intrusion detection systems[C]// Proceedings of the IRIS National Symposium on Sensor and Data Fusion. 1999: 24-27.
|
[5] |
BASS T . Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000,43(4): 99-105.
|
[6] |
席荣荣, 云晓春, 金舒原 ,等. 网络安全态势感知研究综述[J]. 计算机应用, 2012,32(1): 1-4,59.
|
|
XI R R , YUN X C , JIN S Y ,et al. Research survey of network security situation awareness[J]. Journal of Computer Applications, 2012,32(1): 1-4,59.
|
[7] |
龚俭, 臧小东, 苏琪 ,等. 网络安全态势感知综述[J]. 软件学报, 2017,28(4): 1010-1026.
|
|
GONG J , ZANG X D , SU Q ,et al. Survey of network security situation awareness[J]. Journal of Software, 2017,28(4): 1010-1026.
|
[8] |
石乐义, 刘佳, 刘祎豪 ,等. 网络安全态势感知研究综述[J]. 计算机工程与应用, 2019,55(24): 1-9.
|
|
SHI L Y , LIU J , LIU Y H ,et al. Survey of research on network security situation awareness[J]. Computer Engineering and Applications, 2019,55(24): 1-9.
|
[9] |
3GPP. Security architecture and procedures for 5G system:TS 33.501 R17[S]. 2021.
|
[10] |
管磊, 胡光俊, 王专 . 基于大数据的网络安全态势感知技术研究[J]. 信息网络安全, 2016(9): 45-50.
|
|
GUAN L , HU G J , WANG Z . Research on network security situational awareness technology based on big data[J]. Netinfo Security, 2016(9): 45-50.
|
[11] |
琚安康, 郭渊博, 朱泰铭 . 基于开源工具集的大数据网络安全态势感知及预警架构[J]. 计算机科学, 2017,44(5): 125-131.
|
|
JU A K , GUO Y B , ZHU T M . Framework for big data network security situational awareness and threat warning based on open source toolset[J]. Computer Science, 2017,44(5): 125-131.
|
[12] |
卿斯汉, 蒋建春, 马恒太 ,等. 入侵检测技术研究综述[J]. 通信学报, 2004,25(7): 19-29.
|
|
QING S H , JIANG J C , MA H T,et.al . Research on intrusion detection techniques:a survey[J]. Journal of China Institute of Communications, 2004,25(7): 19-29.
|
[13] |
张蕾, 崔勇, 刘静 ,等. 机器学习在网络空间安全研究中的应用[J]. 计算机学报, 2018,41(9): 1943-1975.
|
|
ZHANG L , CUI Y , LIU J ,et al. Application of machine learning in cyberspace security research[J]. Chinese Journal of Computers, 2018,41(9): 1943-1975.
|
[14] |
卓琳, 赵厚宇, 詹思延 . 异常检测方法及其应用综述[J]. 计算机应用研究, 2020,37(S1): 9-15.
|
|
ZHUO L , ZHAO H Y , ZHAN S Y . Overview of anomaly detection methods and applications[J]. Application Research of Computers, 2020,37(S1): 9-15.
|
[15] |
桂永宏 . 业务系统安全基线的研究及应用[J]. 计算机安全, 2011(10): 23-27.
|
|
GUI Y H . Study and applications of operation system security baseline[J]. Computer Security, 2011(10): 23-27.
|
[16] |
马玉超 . 基于机器学习的动态基线性能时序数据异常检测研究与应用[J]. 中国金融电脑, 2020(6): 51-59.
|
|
MA Y C . Research and application of anomaly detection for performance time-sequence data by dynamic baseline based on machine learning[J]. Financial Computer of China, 2020(6): 51-59.
|
[17] |
解晓青, 余晓光, 余滢鑫 ,等. 5G 网络安全渗透测试框架和方法[J]. 信息安全研究, 2021,7(9): 795-801.
|
|
XIE X Q , YU X G , YU Y X ,et al. Penetration test framework and method of 5G cyber security[J]. Journal of Information Security Research, 2021,7(9): 795-801.
|
[18] |
ALAHMADI B A , AXON L , MARTINOVIC I . 99% false positives:a qualitative study of SOC analysts’ perspectives on security alarms[C]// Proceedings of the 31st USENIX Security Symposium (USENIX Security). 2022: 10-12.
|
[19] |
琚安康, 郭渊博, 朱泰铭 ,等. 网络安全事件关联分析技术与工具研究[J]. 计算机科学, 2017,44(2): 38-45.
|
|
JU A K , GUO Y B , ZHU T M ,et al. Survey on network security event correlation analysis methods and tools[J]. Computer Science, 2017,44(2): 38-45.
|
[20] |
贾焰, 亓玉璐, 尚怀军 ,等. 一种构建网络安全知识图谱的实用方法[J]. Engineering, 2018,4(1): 117-133.
|
|
JIA Y , QI Y L , SHANG H J ,et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018,4(1): 117-133.
|