[1] |
ZISSIS D,LEKKAS D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3):583-592.
|
[2] |
WANG Cong,WANG Qian,REN Kui,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]//Proceedings of the 29th IEEE International Conference on Computer Communications,Joint Conference of the IEEE Computer and Communications Societies.Washington D.C.,USA:IEEE Press,2010:1-9.
|
[3] |
HONG Gang,HEYGSTER G,NOTHOLT J,et al. Simulations of microwave brightness temperatures at AMSU-B frequencies over a 3D convective cloud system[J].International Journal of Remote Sensing,2010,31(7):1781-1800.
|
[4] |
SULLIVAN M.Tribeca:a stream database manager for network traffic analysis[C]//Proceedings of International Conference on Very Large Data Bases.New York,USA:ACM Press,1996:594.
|
[5] |
TEUTON J,PETERSON E,NORDWALL D,et al.LINEBACkER:bio-inspired data reduction toward real time network traffic analysis[C]//Proceedings of the 6th International Symposium on Resilient Control Systems.Washington D.C.,USA:IEEE Press,2013:170-174.
|
[6] |
JACK K,ROWELL D,FUGUANG S H I,et al.Network traffic analysis using a flow table:US 8169910B1[P].2013-04-30.
|
[7] |
SOMMER R,PAXSON V.Outside the closed world:on using machine learning for network intrusion detection[C]//Proceedings of 2010 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2010:305-316.
|
[8] |
CORCHADO E,HERRERO Á.Neural visualization of network traffic data for intrusion detection[J].Applied Soft Computing,2011,11(2):2042-2056.
|
[9] |
KOTENKO I,STEPASHKIN M.Attack graph based evaluation of network security[C]//Proceedings of Communications and Multimedia Security.Berlin,Germany:Springer,2006:216-227.
|
[10] |
ALBERTS C J,DOROFEE A.Managing information security risks:the OCTAVE approach [M].Boston,USA:Addison-Wesley Longman Publishing,2002.
|
[11] |
CHAPMAN C,WARD S.Project risk management:processes,techniques and insights [M].Hoboken,USA:Wiley,1996.
|
[12] |
RITCHEY R W,AMMANN P.Using model checking to analyze network vulnerabilities[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:156-165.
|
[13] |
HA S,SHEYNER O,WING J M.Minimization and reliability analyses of attack graphs [EB/OL].[2018-05-20].http://pdfs.semanticscholar.org/2480/93713c93916ad4063f916294d1fac683aa7d.pdf.
|
[14] |
LYE K,WING J M.Game strategies in network security[J].International Journal of Information Security,2005,4(1/2):71-86.
|
[15] |
ROTHMAIER G,KRUMM H.A framework based approach for formal modeling and analysis of multi-level attacks in computer networks[C]//Proceedings of International Conference on Formal Techniques for Networked and Distributed Systems.Berlin,Germany:Springer,2005:247-260.
|
[16] |
MADAN B B,GOŠEVA-POPSTOJANOVA K,VAIDYANATHAN K,et al.A method for modeling and quantifying the security attributes of intrusion tolerant systems[J].Performance valuation,2004,56(1):167-186.
|
[17] |
SINGH S,LYONS J,NICOL D M.Fast model-based penetration testing[C]//Proceedings of the 2004 Winter Simulation Conference.Berlin,Germany:Springer,2004:309-317.
|
[18] |
KOTENKO I,STEPASHKIN M.Attack graph based evaluation of network security[C]//Proceedings of IFIP International Conference on Communications and Multimedia Security.Berlin,Germany:Springer,2006:216-227.
|
[19] |
LI Wei,CANINI M,MOORE A W,et al.Efficient application identification and the temporal and spatial stability of classification schema[J].Computer Networks,2009,53(6):790-809.
|
[20] |
张伟,解争龙,丁要军,等.GPU Openflow海量网络数据处理模型[J].计算机应用,2014,34(8):2243-2247.
|