[1] |
修健 . 网络安全分析中的大数据技术应用分析[J]. 网络安全技术与应用, 2018(3): 67-115.
|
|
XIU J . The analysis of big data technology application in network security[J]. Network Security Technology & Application, 2018(3): 67-115.
|
[2] |
司德睿, 华程, 杨红光 ,等. 一种基于机器学习的安全威胁分析系统[J]. 信息技术与网络安全, 2019,38(4): 37-41.
|
|
SI D R , HUA C , YANG H G ,et al. An intelligent analysis system for security threats based on machine learning[J]. Information Technology and Network Security, 2019,38(4): 37-41.
|
[3] |
汪渊, 蒋凡, 陈国良 . 基于图论的网络安全分析方法研究与应用[J]. 小型微型计算机系统, 2003(10): 1865-1869.
|
|
WANG Y , JIANG F , CHEN G L . A network security analysis method research and application based on graph theory[J]. Journal of Chinese Computer Systems, 2003(10): 1865-1869.
|
[4] |
侯梦薇, 卫荣, 陆亮 ,等. 知识图谱研究综述及其在医疗领域的应用[J]. 计算机研究与发展, 2018,55(12): 2587-2599.
|
|
HOU M W , WEI L , LU L ,et al. Research review of knowledgegraph and its application in medical domain[J]. Journal of Computer Research and Development, 2018,55(12): 2587-2599.
|
[5] |
刘峤, 李杨, 段宏 ,等. 知识图谱构建技术综述[J]. 计算机研究与发展, 2016,53(3): 582-600.
doi: 10.7544/issn1000-1239.2016.20148228
|
|
LIU Q , LI Y , DUAN H ,et al. Knowledge graph construction techniques[J]. Journal of Computer Research and Development, 2016,53(3): 582-600.
doi: 10.7544/issn1000-1239.2016.20148228
|
[6] |
汤楠, 申德荣, 寇月 ,等. 一种面向多源知识图谱的样例查询方法[J]. 计算机研究与发展, 2015,52(S1): 1-8.
|
|
TANG N , SHEN D R , KOU Y ,et al. A query-by-example method for multiple knowledge graphs[J]. Journal of Computer Research and Development, 2015,52(S1): 1-8.
|
[7] |
王永杰, 鲜明, 刘进 ,等. 基于攻击图模型的网络安全评估研究[J]. 通信学报, 2007(3): 29-34.
|
|
WANG Y J , XIAN M , LIU J ,et al. Study of network security evaluation based on attack graph model[J]. Journal on Communications, 2007(3): 29-34.
|
[8] |
叶云, 徐锡山, 贾焰 ,等. 基于攻击图的网络安全概率计算方法[J]. 计算机学报, 2010,33(10): 1987-1996.
|
|
YE Y , XU X S , JIA Y ,et al. An attack graph-based probabilistic computing approach of network security[J]. Chinese Journal of Computers, 2010,33(10): 1987-1996.
|
[9] |
吴迪, 连一峰, 陈恺 ,等. 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报, 2012,35(9): 1938-1950.
|
|
WU D , LIAN Y F , CHEN K ,et al. A security threats identification and analysis method based on attack graph[J]. Chinese Journal of Computers, 2012,35(9): 1938-1950.
|
[10] |
胡浩, 刘玉岭, 张玉臣 ,等. 基于攻击图的网络安全度量研究综述[J]. 网络与信息安全学报, 2018,4(9): 1-16.
|
|
HU H , LIU Y L , ZHANG Y C ,et al. Survey of attack graph based network security metric[J]. Chinese Journal of Network and Information Security, 2018,4(9): 1-16.
|
[11] |
余洋, 夏春和, 胡潇云 . 采用混和路径攻击图的防御方案生成方法[J]. 浙江大学学报(工学版), 2017,51(9): 1745-1759.
|
|
YU Y , XIA C H , HU X Y . Defense scheme generation method using mixed path attack graph[J]. Journal of Zhejiang University (Engineering Science), 2017,51(9): 1745-1759.
|
[12] |
殷树刚, 许勇刚, 李祉岐 ,等. 基于泛在电力物联网的全场景网络安全防护体系研究[J]. 供用电, 2019,36(6): 83-89.
|
|
YIN S G , XU Y G , LI Z Q ,et al. Research on full scene network security protection system based on ubiquitous power internet of things[J]. Distribution & Utilization, 2019,36(6): 83-89.
|
[13] |
王静, 高昆仑, 张波 . 基于网络隔离与安全数据交换的发电集团双网体系研究与设计[J]. 电信科学, 2017,33(2): 163-172.
|
|
WANG J , GAO K L , ZHANG B . Research and design in dual network scheme of power corporation based on network isolation and secure data exchange[J]. Telecommunications Science, 2017,33(2): 163-172.
|