[1] |
LEAU Y B , MANICKAM S . Network security situation prediction:a review and discussion[J]. Communications in Computer & Information Science, 2015,516: 424-435.
|
[2] |
CIPRIANO C , ZAND A , HOUMANSADR A ,et al. Nexat:a history-based approach to predict attacker actions[C]// Proceedings of the 27th Annual Computer Security Applications Conference. New York:ACM Press, 2011: 383-392.
|
[3] |
XIAO P , XIAN M , WANG H M . Network security situation prediction method based on MEA-BP[C]// 3rd International Conference on Computational Intelligence & Communication Technology. Piscataway:IEEE Press, 2017: 1-5.
|
[4] |
SUN S X , . The research of the network security situation prediction mechanism based on the complex network[C]// International Conference on Computational Intelligence and Communication Networks. Piscataway:IEEE Press, 2015: 1183-1187.
|
[5] |
LEAU Y B , KHUDHER A A , MANICKAM S ,et al. An adaptive assessment and prediction mechanism in network security situation awareness[J]. Journal of Computer Science, 2017,13(5): 114-129.
|
[6] |
SCHATZ D , BASHROUSH R . Security predictions-a way to reduce uncertainty[J]. Journal of Information Security and Applications, 2019,45: 107-116.
|
[7] |
孙卫喜, 孙欢 . 网络安全态势预测技术研究[J]. 计算机技术与发展, 2019,29(4): 100-104.
|
|
SUN W X , SUN H . Research on network security situation prediction technology[J]. Computer Technology and Development, 2019,29(4): 100-104.
|
[8] |
周新卫, 李小玲 . 基于改进 G-K 算法的多节点网络安全态势预测模型[J]. 科学技术与工程, 2018,18(25): 72-77.
|
|
ZHOU X W , LI X L . Multi node network security situation prediction model based on improved G-K algorithm[J]. Science Technology and Engineering, 2018,18(25): 72-77.
|
[9] |
韩晓露, 刘云, 张振江 ,等. 基于 IFS-NARX 模型的网络安全态势预测[J]. 吉林大学学报(工学版), 2019,49(2): 592-598.
|
|
HAN X L , LIU Y , ZHANG Z J ,et al. Network security situation prediction method based on IFS-NARX model[J]. Journal of Jilin University (Engineering and Technology Edition), 2019,49(2): 592-598.
|
[10] |
席荣荣, 云晓春, 张永铮 . 一种改进的网络安全态势量化评估方法[J]. 计算机学报, 2015,38(4): 749-758.
|
|
XI R R , YUN X C , ZHANG Y Z ,et al. An improved quantitative evaluation method for network security[J]. Chinese Journal of Computers, 2015,38(4): 749-758.
|
[11] |
DEBAR H , WESPI A . Aggregation and correlation of intrusion-detection alerts[C]// International Symposium on Recent Advances in Intrusion Detection. Berlin:Springer, 2001: 85-103.
|
[12] |
赵冬梅, 张玉清, 马建峰 . 熵权系数法应用于网络安全的模糊风险评估[J]. 计算机工程, 2004,30(18): 21-23.
|
|
ZHAO D M , ZHANG Y Q , MA J F . Fuzzy risk assessment of entropy-weight coefficient method applied in network security[J]. Computer Engineering, 2004,30(18): 21-23.
|
[13] |
付钰, 吴晓平, 叶清 . 基于模糊集与熵权理论的信息系统安全风险评估研究[J]. 电子学报, 2010,38(7): 1489-1494.
|
|
FU Y , WU X P , YE Q . An approach for information systems security risk assessment on fuzzy set and entropy-weight[J]. Chinese Journal of Electronics, 2010,38(7): 1489-1494.
|
[14] |
王笑, 戚湧, 李千目 . 基于时变加权马尔可夫链的网络异常检测模型[J]. 计算机科学, 2017,44(9): 136-141,161.
|
|
WANG X , QI Y , LI Q M . Network anomaly detection model based on time-varying weighted Markov chain[J]. Computer Science, 2017,44(9): 136-141,161.
|
[15] |
杨宏宇, 韩越 . 基于动态信誉的无线 Mesh 网络安全路由机制[J]. 通信学报, 2019,40(4): 195-201.
|
|
YANG H Y , HAN Y . Wireless Mesh network secure routing mechanism based on dynamic reputation[J]. Journal on Communications, 2019,40(4): 195-201.
|
[16] |
杨宏宇, 王在明 . Android 共谋攻击检测模型[J]. 通信学报, 2018,39(6): 27-36.
|
|
YANG H Y , WANG Z M . Android collusion attack detection model[J]. Journal on Communications, 2018,39(6): 27-36.
|