参考文献/References:
[1] T. Bass. Multi-sensor data fusion for next generation distributed intrusion detection systems. Proceedings of IRIS National Symposium on Sensor and Data Fusion, 1999: 24-27. [2] J.Shifflet.A technique independent fusion model for network intrusion detection. Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics, 2004: 13-19. [3] G.Tadda, J.J. Salerno, D.Boulware, et.al. Realizing situation awareness in a cyber environment. Proceedings of Multisensor, Multisource Information Fusion: Architecture, Algorithms, and Applications, 2006, SPIE 6242: 1-8. [4] B.Sabata, C.Ornes. Multi-source evidence fusion for cyber situation assessm ent[C]. Multisensor, Multisource Information Fusion: Architecture, Algorithms, and Applications, 2006:1-9. [5] S.Yang, A.Stotz, J.Holsopple, et al. High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion, 2009, 10(1): 107-121. [6] C.Siaterlis, V.Maglaris. One step ahead to multisensor data fusion for DDoS detection[J]. Journal of Computer Security,
2005(13):779-806. [7] D.Shen, G.Chen, J.B. Cruz, et al.A markov game theoretic data fusion approach for cyber situational awareness. Multisensor, Multisource Information Fusion: Architecture, Algorithms, and Applications, 2007: 1-11. [8] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估 模型[J].计算机研究与发展,2009,46(3):353-362. [9] 陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化 评估方法[J].软件学报,2006,17(4):885-897. [10] 陆余良,夏阳.主机安全量化融合模型研究[J].计算机学 报,2005,28(5):914-920. [11] 张永铮,方滨兴,迟悦,等.用于评估网络信息系统的风险传 播模型[J].软件学报,2007,18(1):137-145. [12] 汪楚娇,林果园.网络安全风险的模糊层次综合评估模型 [J].武汉大学学报(理学版),2006,52(5):622-626. [13] 刘效武,王慧强,赖积保,等.基于多源异质融合的网络安全 态势生成与评估.系统仿真学报,2010,22(6): 1411-1415. [14] 梁颖,王慧强,刘磊.基于服务影响分析的网络安全态势定 量感知方法[J].东南大学学报(自然科学版),2008,38: 64-67. [15] 姚淑萍.攻防对抗环境下的网络安全态势评估技术研究[J]. 科技导报,2007,25(7):9-12. [16] 任伟,蒋兴浩,孙锬锋.基于 RBF 神经网络的网络安全态势 预测方法[J].计算机工程与应用,2006,42(31):136-138. [17] 胡威,李建华,陈秀真,等.可扩展的网络安全态势评价模型 优化设计[J].电子科技大学学报,2008,38(1):113-116. [18] 韦勇,连一峰.基于日志审计与性能修正算法的网络安全 态势评估模型[J].计算机学报,2009,32(4):763-772. [19] 陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化 评估方法[J].软件学报,2006,17(4):885-897.
相似文献/References:
[1]黄保华.用于网络安全教学课堂实时演示的虚拟化系统[J].大众科技,2014,16(01):20.
[2]赵中原 杨立身.层次化校园网络的规划设计与实现[J].大众科技,2014,16(08):37.
Design and implement of campus hierarchical network[J].Popular Science & Technology,2014,16(11):37.
[3]袁 歆.DDOS 攻击防护解决方案研究[J].大众科技,2014,16(11):9.
Research on scheme of DDOS attack protection solution[J].Popular Science & Technology,2014,16(11):9.
[4]罗添耀.基于安全代理网关的高校网络安全探究[J].大众科技,2022,24(09):25.
Research on University Network Security Based on Security Proxy Gateway[J].Popular Science & Technology,2022,24(11):25.
[5]宋进文.关于5G AeroMACS网络安全的分析与探讨[J].大众科技,2023,25(10):27.
Analysis and Discussion on 5G AeroMACS Network Security[J].Popular Science & Technology,2023,25(11):27.
[6]雷雪峰.计算机网络安全问题及其对策研究[J].大众科技,2024,26(4):44.
[J].Popular Science & Technology,2024,26(11):44.