[1] |
Bass T.Multi-sensor data fusion for next generation distributed intrusion detection systems[C]∥Proceedings of the'99 IRIS National Symposium on Sensor and Data Fusion.Piscataway,NJ:IEEE Press,1999:24-27.
|
[2] |
Mazur J,Kaderali L.The importance and challenges of bayesian parameter learning in systems biology[J].Model Based Parameter Estimation Contributions in Mathematical and Computational Sciences,2013,4:145-156.
|
[3] |
黄同庆,庄毅.一种实时网络安全态势预测方法[J].小型微型计算机系统,2014,35(2):303-306.Huang T Q,Zhuang Y.An approach to real-time network security situation prediction[J].Journal of Chinese Computer Systems,2014,35(2):303-306(in Chinese).
|
[4] |
Blasch E P,Plano S.JDL level 5 fusion model "user refinement" issues and applications in group tracking[C]∥Proceedings of the Signal Processing,Sensor Fusion,and Target Recognition XI,Spie.Bellingham,WA:SPIE,2002:270-279.
|
[5] |
龚正虎,卓莹.网络态势感知研究[J].软件学报,2010,21(7):1605-1619.Gong Z H,Zhuo Y.Research on cyberspace situational awareness[J].Journal of Software,2010,21(7):1605-1619(in Chinese).
|
[6] |
Bradshaw J M,Carvalho M,Bunch L,et al.Sol:An agent-based framework for cyber situation awareness[J].KI-Künstliche Intelligenz,2012,26(1):127-140.
|
[7] |
Digioia G,Foglietta C,Oliva G,et al.Aware online interdependency modeling via evidence theory[J].International Journal of Critical Infrastructures,2013,6893:74-92.
|
[8] |
Bazan J G,Bazan-Socha S,Buregwa-Czuma S,et al.Classifiers based on data sets and domain knowledge:A rough set approach[J].Intelligent Systems Reference Library,2013,43:93-136.
|
[9] |
Sample C,Schaffer K.An overview of anomaly detection[J].IT Professional,2013,15(1):8-11.
|
[10] |
王宏,龚正虎.一种基于信息熵的关键流量矩阵发现算法[J].软件学报,2009,20(5):1377-1383.Wang H,Gong Z H.Algorithm based on entropy for finding critical traffic matrices[J].Journal of Software,2009,20(5):1377-1383(in Chinese).
|
[11] |
陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.Chen X Z,Zheng Q H,Guan X H,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,2006,17(4):885-897(in Chinese).
|
[12] |
Görnitz N,Kloft M,Rieck K,et al.Toward supervised anomaly detection[J].Journal of Artificial Intelligence Research,2013,46:235-262.
|
[13] |
Erbachera R F,Frinckeb D A,Wongb P C,et al.A multi-phase network situational awareness cognitive task analysis[J].Information Visualization,2010,9(3):204-219.
|
[14] |
韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362.Wei Y,Lian Y F,Feng D G.A network security situational awareness model based on information fusion[J].Journal of Computer Research and Development,2009,46(3):353-362(in Chinese).
|
[15] |
张勇,谭小彬,崔孝林,等.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508.Zhang Y,Tan X B,Cui X L,et al.Network security situation awareness approach based on Markov game model[J].Journal of Software,2011,22(3):495-508(in Chinese).
|
[16] |
谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报:自然科学版,2013,53(12):1750-1760.Xie L X,Wang Y C,Yu J B.Network security situation awareness based on neural networks[J].Journal of Tsinghua University:Science & Technology,2013,53(12):1750-1760(in Chinese).
|