参考文献
[1] 王慧强, 赖积保, 朱 亮, 等. 网络态势感知系统研究综 述[J]. 计算机科学, 2006, 33(10): 5-10.
[2] Hall D L, Llinas J. An Introduction to Multisensor Data Fusion[J]. Proceedings of the IEEE, 1997, 85(1): 6-23.
[3] Salerno J. Information Fusion: A High-level Architecture Overview[C]//Proc. of the 5th International Conference on Information Fusion. Annapolis, USA: IEEE Press, 2002: 680- 686.
[4] 张连文, 郭海鹏. 贝叶斯网引论[M]. 北京: 科学出版社, 2006.
[5] 罗 文, 李敏勇, 张晓锐. 基于贝叶斯网络的态势认识[J]. 火力与指挥控制, 2010, 35(3): 89-92.
[6] 周志强, 张晓燕. 基于贝叶斯网络的博弈融合态势评估方法[J]. 计算机与数字工程, 2008, 36(10): 17-19.
[7] 戴亚平, 刘 征, 郁光辉. 多传感器数据融合理论及应 用[M]. 北京: 北京理工大学出版社, 2004.
[8] 诸葛建伟, 王大为, 陈 昱, 等. 基于D-S证据理论的网络异常检测方法[J]. 软件学报, 2006, 17(3): 463-471.
[9] Qu Zhaoyang, Li Yaying, Li Peng. A Network Security Situation Evaluation Method Based on D-S Evidence Theory[C]//Proc. of ESIAT’10. Wuhan, China: [s. n.], 2010: 496-499.
[10] 苗夺谦, 李道国. 粗糙集理论, 算法与应用[M]. 北京: 清华大学出版社, 2008.
[11] 梁 颖, 王慧强, 赖积保. 一种基于粗糙集理论的网络安全态势感知方法[J]. 计算机科学, 2007, 34(8): 95-97.
[12] Meng Guanglei, Gong Guanghong. Algorithm of Battlefield Situation Assessment Based on Bayesian Network and Rough Set Theory[C]//Proc. of the 7th International Conference on System Simulation and Scientific Computing. Beijing, China: [s. n.], 2008: 776-779.
[13] Wang Xiaofan, Wang Baoshu. Methods for Situation Assess- ment of Multi-attribute Decision Making Based on Rough Sets[C]//Proc. of the 6th International Conference on Fuzzy Systems and Knowledge Discovery. Tianjin, China: [s. n.], 2009: 325-328.
[14] 韩力群. 人工神经网络教程[M]. 北京: 北京邮电大学出版社, 2006.
[15] 任 伟, 蒋兴浩, 孙锬锋. 基于RBF神经网络的网络安全态势预测方法[J]. 计算机工程与应用, 2006, 42(31): 136- 138.
[16] 孟 锦, 马 驰, 何加浪, 等. 基于HHGA-RBF神经网络的网络安全态势预测模型[J]. 计算机科学, 2011, 38(7): 70-72.
[17] Lai Jibao, Wang Huiqiang, Liu Xiaowu, et al. A Quantitative Prediction Method of Network Security Situation Based on Wavelet Neural Network[C]//Proc. of the 1st International Symposium on Data, Privacy, and E-commerce. Chengdu, China: [s. n.], 2007: 197-202.
[18] Wang Huiqiang, Liu Xiaowu, Lai Jibao, et al. Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network[C]//Proc. of the 2nd International Multi-symposiums on Computer and Computational Sciences. Iowa, USA: IEEE Press, 2007: 352-359.
[19] Rabiner L R. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition[J]. Proceedings of the IEEE, 1989, 77(2): 257-286.
[20] Shen Dan, Chen Genshe, Cruz J B, et al. A Markov Game Theoretic Data Fusion Approach for Cyber Situational Awareness[C]//Proc. of IEEE Military Communications Conference. Orlando, USA: [s. n.], 2007: 1-7.
(下转第30页)
(上接第25页)
[21] Zhang Qiang, Man Dapeng, Yang Wu. Using HMM for Intent Recognition in Cyber Security Situation Awareness[C]//Proc. of the 2nd International Symposium on Knowledge Acquisition and Modeling. Wuhan, China: [s. n.], 2009: 166-169.
[22] Endsley M R. Toward a Theory of Situation Awareness in Dynamic Systems[J]. Human Factors: The Journal of the Human Factors and Ergonomics Society, 1995, 37(1): 32-64.
[23] Jajodia S, Liu P, Swarup V, et al. Cyber Situational Awareness: Issues and Research[M]. [S. l.]: Springer, 2010.
[24] Ammann P, Wijesekera D, Kaushik S. Scalable, Graph-based Network Vulnerability Analysis[C]//Proc. of the 9th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2002: 217-224.
[25] Cheung S, Lindqvist U, Fong M W. Modeling Multistep Cyber Attacks for Scenario Recognition[C]//Proc. of DARPA Information Survivability Conference and Exposition. Washington D. C., USA: IEEE Press, 2003: 284-292.
[26] Mell P, Scarfone K, Romanosky S. A Complete Guide to the Common Vulnerability Scoring System Version 2.0[M]. [S. l.]: FIRST.org, Inc., 2007.
编辑 任吉慧 |