[1] |
方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1): 1-5.
|
|
FANG B X . Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-5.
|
[2] |
季新生, 梁浩, 扈红超 . 天地一体化信息网络安全防护技术的新思考[J]. 电信科学, 2017,33(12): 24-35.
|
|
JI X S , LIANG H , HU H C . New thoughts on security technologies for space-ground integration information network[J]. Telecommunications Science, 2017,33(12): 24-35.
|
[3] |
蒋盘林 . 反卫星电子攻击综述[J]. 通信对抗, 2016(2): 42-46.
|
|
JIANG P L . Review of anti-satellite electronic attack[J]. Communication Countermeasures, 2016(2): 42-46.
|
[4] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[5] |
KIWIA D , DEHGHANTANHA A , CHOO K K R ,et al. A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence[J]. Journal of Computational Science, 2018,27: 394-409.
|
[6] |
BRYANT B D , SAIEDIAN H . A novel kill-chain framework for remote security log analysis with SIEM software[J]. Computers &Security, 2017,67: 198-210.
|
[7] |
漆桂林, 高桓, 吴天星 . 知识图谱研究进展[J]. 情报工程, 2017,3(1): 4-25.
|
|
QI G L , GAO H , WU T X . The research advances of knowledge graph[J]. Technology Intelligence Engineering, 2017,3(1): 4-25.
|
[8] |
PUJARA J , MIAO H , GETOOR L ,et al. Knowledge graph identification[M]// Advanced Information Systems Engineering. Berlin,Heidelberg: Springer Berlin Heidelberg, 2013: 542-557.
|
[9] |
DETTMERS T , MINERVINI P , STENETORP P ,et al. Convolutional 2D knowledge graph embeddings[J]. arXiv:1707.01476v6. 2017.
|
[10] |
WANG Z , ZHANG J , FENG J ,et al. Knowledge graph embedding by translating on hyperplanes[C]// Twenty-eighth Aaai Conference on Artificial Intelligence. AAAI Press, 2014.
|
[11] |
王慧强, 赖积保, 朱亮 ,等. 网络态势感知系统研究综述[J]. 计算机科学, 2006,33(10): 5-10.
|
|
WANG H Q , LAI J B , ZHU L ,et al. Survey of network situation awareness system[J]. Computer Science, 2006,33(10): 5-10.
|
[12] |
FRANKE U , BRYNIELSSON J . Cyber situational awareness - A systematic review of the literature[J]. Computers & Security, 2014(46): 18-31.
|
[13] |
龚俭, 臧小东, 苏琪 ,等. 网络安全态势感知综述[J]. 软件学报, 2017,28(4): 1010-1026.
|
|
GONG J , ZANG X D , SU Q ,et al. Survey of network security situation awareness[J]. Journal of Software, 2017,28(4): 10101026.
|
[14] |
刘效武, 王慧强, 吕宏武 ,等. 网络安全态势认知融合感控模型[J]. 软件学报, 2016,27(8): 2099-2114.
|
|
LIU X W , WANG H Q , LYU H W ,et al. Fusion-based cognitive awareness-control model for network security situation[J]. Journal of Software, 2016,27(8): 2099-2114.
|
[15] |
SINGH M , BHANDARI P . Building a framework for network security situation awareness[C]// Proceedings of 2016 3rd International Conference on Computing for Sustainable Global Development(INDIACom). Piscataway:IEEE Press, 2016: 2578-2583.
|
[16] |
XU G Q , CAO Y , REN Y Y ,et al. Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things[J]. IEEE Access, 2017(5): 21046-21056.
|
[17] |
JIA Y , QI Y L , SHANG H J ,et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018,4(1): 53-60.
|
[18] |
李琪, 张欣, 张平康 ,等. 基于Spark框架的CFSFDP改进算法[J]. 电子科技, 2019,32(5): 38-43,54.
|
|
LI Q , ZHANG X , ZHANG P K ,et al. Improved CFSFDP algorithm based on spark framework[J]. Electronic Science and Technology, 2019,32(5): 38-43,54.
|