参考文献
[1]ISO/IEC.ISO/IEC 15408-2005 Common Criteria for Information Technology.Security Evaluation[S].Geneva,Switzerland:ISO Press,2005.
[2]中国国家标准化管理委员会.GB/T 20272-2006 信息安全技术操作系统安全技术要求[S].北京:中国标准出版社,2006.
[3]王永吉,吴敬征.隐蔽信道研究[J].软件学报,2010,21(9):2262-2288.
[4]吴小进.网络隐蔽信道检测技术的研究[D].南京:南京理工大学,2012.
[5]华元彬,蒋建春,卿斯汉.基于链路分析法的复合隐蔽通道检测[J].计算机应用,2006,26(1):81-83.
[6]吴传伟,孙瑞,罗敏.基于SVM的Telnet隐蔽信道检测[J].信息安全与通信保密,2012,(9):97-98.
[7]Sohn T,Seo J T,Moon J.A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine[C]//Proceedins of ICICS’03.Berlin,Germany:Springer,2003:313-324.
[8]Porras P A,Kemmerrer R A.Covert Flow Trees:A Technique for Identifying and Analyzing Covert Channels[C]//Proceedings of IEEE Computer Society Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,1991:36-51.
[9]周爱武,于亚飞.K-Means聚类算法的研究[J].计算机技术与发展,2011,21(2):62-65.
[10]Tumonian E,Anikeev M.Network Based Detection of Passive Covert Channels in TCP/IP[C]//Proceedings of the 30th IEEE Conference on Local Computer Networks Anniversary.Washington D.C.,USA:IEEE Press,2005:802-809.
[11]Han Jiawei,Kamber M.Data Mining:Concepts and Techniques[M].San Francisco,USA:Morgan Kaufmann Publishers,2001.
[12]唐彰国,李焕洲,钟明全,等.基于量子神经网络的启发式网络隐蔽信道检测模型[J].计算机应用研究,2012,29(8):3033-3035,3038.
[13]安淑芝.数据仓库与数据挖掘[M].北京:清华大学出版社,2005.
编辑金胡考 |