[1] |
YUAN X Y , HE P , ZHU Q L ,et al. Adversarial examples:attacks and defenses for deep learning[J]. IEEE Transactions on Neural Networks and Learning Systems, 2019,30(9): 2805-2824.
|
[2] |
LAKHDHAR Y , REKHIS S . Active,reactive and proactive visibility-based cyber defense for defending against attacks on critical systems[C]// Proceedings of International Wireless Communications and Mobile Computing. Piscataway:IEEE Press, 2020: 439-444.
|
[3] |
JIANG F , FU Y S , GUPTA B B ,et al. Deep learning based multi-channel intelligent attack detection for data security[J]. IEEE Transactions on Sustainable Computing, 2020,5(2): 204-212.
|
[4] |
SYED Z , PADIA A , MATHEWS M L ,et al. UCO:a unified cybersecurity ontology[C]// AAAI Workshop:Artificial Intelligence for Cyber Security. Palo Alto:AAAI Press, 2016: 195-202.
|
[5] |
ZHANG K , LIU J J . Ontology construction for security analysis of network nodes[C]// Proceedings of International Conference on Communications,Information System and Computer Engineering. Piscataway:IEEE Press, 2020: 292-297.
|
[6] |
PUJARA J , MIAO H , GETOOR L ,et al. Ontology-aware partitioning for knowledge graph identification[C]// Proceedings of the 2013 workshop on Automated knowledge base construction. New York:ACM Press, 2013: 19-24.
|
[7] |
BEITOLLAHI H , DECONINCK G . Analyzing well-known countermeasures against distributed denial of service attacks[J]. Computer Communications, 2012,35(11): 1312-1332.
|
[8] |
THERON P , KOTT A . When autonomous intelligent goodware will fight autonomous intelligent malware:a possible future of cyber defense[C]// Proceedings of IEEE Military Communications Conference. Piscataway:IEEE Press, 2020: 1-7.
|
[9] |
ZHOU Z , KUANG X H , SUN L M ,et al. Endogenous security defense against deductive attack:when artificial intelligence meets active defense for online service[J]. IEEE Communications Magazine, 2020,58(6): 58-64.
|
[10] |
BASALLO Y A , SENTI V E , SANCHEZ N M . Artificial intelligence techniques for information security risk assessment[J]. IEEE Latin America Transactions, 2018,16(3): 897-901.
|
[11] |
CHEN J , ZHU Q . Interdependent strategic security risk management with bounded rationality in the internet of things[J]. IEEE Transactions on Information Forensics and Security, 2019,14(11): 2958-2971.
|
[12] |
LI X H , ZHU M Y , YANG L T ,et al. Sustainable ensemble learning driving intrusion detection model[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1591-1604.
|
[13] |
雷程, 马多贺, 张红旗 ,等. 基于网络攻击面自适应转换的移动目标防御技术[J]. 计算机学报, 2018,41(5): 1109-1131.
|
|
LEI C , MA D H , ZHANG H Q ,et al. Moving target defense technique based on network attack surface self-adaptive mutation[J]. Chinese Journal of Computers, 2018,41(5): 1109-1131.
|
[14] |
张红霞, 王琪, 王登岳 ,等. 基于深度学习的区块链蜜罐陷阱合约检测[J]. 通信学报, 2022,43(1): 194-202.
|
|
ZHANG H X , WANG Q , WANG D Y ,et al. Honeypot contract detection of blockchain based on deep learning[J]. Journal on Communications, 2022,43(1): 194-202.
|
[15] |
KIM H , BEN-OTHMAN J . Toward integrated virtual emotion system with AI applicability for secure CPS-enabled smart cities:AI-based research challenges and security issues[J]. IEEE Network, 2020,34(3): 30-36.
|
[16] |
VAST R , SAWANT S , THORBOLE A ,et al. Artificial intelligence based security orchestration,automation and response system[C]// Proceedings of 2021 6th International Conference for Convergence in Technology. Piscataway:IEEE Press, 2021: 1-5.
|
[17] |
YAN B J , YAO P C , WANG J M ,et al. Game theoretical dynamic cybersecurity defense strategy for electrical cyber physical systems[C]// Proceedings of 2021 IEEE 5th Conference on Energy Internet and Energy System Integration. Piscataway:IEEE Press, 2022: 2392-2397.
|
[18] |
JIANG Y , CEDER A A . Incorporating personalization and bounded rationality into stochastic transit assignment model[J]. Transportation Research Part C:Emerging Technologies, 2021,127: 1-26.
|
[19] |
ZHENG H J , WANG Y C , HAN C ,et al. Learning and applying ontology for machine learning in cyber attack detection[C]// Proceedings of 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering. Piscataway:IEEE Press, 2018: 1309-1315.
|
[20] |
WOTAWA F , BOZIC J , LI Y H . Ontology-based testing:an emerging paradigm for modeling and testing systems and software[C]// Proceedings of 2020 IEEE International Conference on Software Testing,Verification and Validation Workshops. Piscataway:IEEE Press, 2020: 14-17.
|
[21] |
KIM M , DEY S , LEE S W . Ontology-driven security requirements recommendation for APT attack[C]// Proceedings of 2019 IEEE 27th International Requirements Engineering Conference Workshops. Piscataway:IEEE Press, 2019: 150-156.
|
[22] |
KIM B J , LEE S W . Understanding and recommending security requirements from problem domain ontology:a cognitive three-layered approach[J]. Journal of Systems and Software, 2020,169:110695.
|
[23] |
MOHAMMADI S , MIRVAZIRI H , GHAZIZADEH-AHSAEE M , ,et al. Cyber intrusion detection by combined feature selection algorithm[J]. Journal of Information Security and Applications, 2019,44: 80-88.
|
[24] |
AZWAR H , MURTAZ M , SIDDIQUE M ,et al. Intrusion detection in secure network for cybersecurity systems using machine learning and data mining[C]// Proceedings of IEEE 5th International Conference on Engineering Technologies and Applied Sciences. Piscataway:IEEE Press, 2019: 1-9.
|
[25] |
INJADAT M , MOUBAYED A , NASSIF A B ,et al. Multi-stage optimized machine learning framework for network intrusion detection[J]. IEEE Transactions on Network and Service Management, 2021,18(2): 1803-1816.
|
[26] |
GAJDEROWICZ B . Artificial intelligence planning techniques for emulating agents with application in social services[D]. Toronto:University of Toronto, 2019.
|
[27] |
HARRISON L , SPAHN R , IANNACONE M ,et al. NV:Nessus vulnerability visualization for the Web[C]// Proceedings of the Ninth International Symposium on Visualization for Cyber Security. New York:ACM Press, 2012: 25-32.
|
[28] |
ALFORD R , LAWRENCE D , KOUREMETIS M . CALDERA:a red-blue cyber operations automation platform[C]// Proceedings of the 32nd International Conference on Automated Planning and Scheduling. Palo Alto:AAAI Press, 2022: 375-376.
|
[29] |
STROM B E , APPLEBAUM A , MILLER D P ,et al. MITRE ATT&CK:design and philosophy[R]. 2018.
|
[30] |
PANFILI M , GIUSEPPI A , FIASCHETTI A ,et al. A game-theoretical approach to cyber-security of critical infrastructures based on multi-agent reinforcement learning[C]// Proceedings of 26th Mediterranean Conference on Control and Automation. Piscataway:IEEE Press, 2018: 460-465.
|
[31] |
ASVIJA B , ESWARI R , BIJOY M B . Bayesian attack graphs for platform virtualized infrastructures in clouds[J]. Journal of Information Security and Applications, 2020,51:102455.
|
[32] |
杨宏宇, 袁海航, 张良 . 基于攻击图的主机安全评估方法[J]. 通信学报, 2022,43(2): 89-99.
|
|
YANG H Y , YUAN H H , ZHANG L . Host security assessment method based on attack graph[J]. Journal on Communications, 2022,43(2): 89-99.
|
[33] |
SANDOVAL J E , HASSELL S P . Measurement,identification and calculation of cyber defense metrics[C]// Proceedings of 2010 Military Communications Conference. Piscataway:IEEE Press, 2011: 2174-2179.
|
[34] |
ZHENG L , PERL Y , ELHANAN G ,et al. Summarizing an ontology:a big knowledge coverage approach[J]. Studies in Health Technology and Informatics, 2017,245: 978-982.
|