[1] SCHIFFMAN B,MANI I,CONCEPCION K.Producing biographical summaries:combining linguistic knowledge with corpus statistics[C]//Proceedings of the 39th Annual Meeting of the Association for Computational Linguistics.Philadelphia,USA:Association for Computational Linguistics,2002:450-457. [2] ZHOU L,TICREA M,HOVY E.Multi-document biography summarization[EB/OL].[2018-10-15].https://www.researchgate.net/publication/1863946_Multi-document_Biography_Summarization. [3] FILATOVA E,PRAGER J.Tell me what you do and I'll tell you what you are:learning occupation-related activities for biographies[EB/OL].[2018-10-15].http://www.doc88.com/p-9039789072425.html. [4] ZHAO Zhijian.Building mobile user behavior analysis model[J].China Science and Technology Information,2014(1):100-101.(in Chinese)赵之健.构建移动用户行为分析模型[J].中国科技信息,2014(1):100-101. [5] ANIZA N,AMRAN N,ZAINI N,et al.User profile based product recommendation on Android platform[C]//Proceedings of the 5th International Conference on Intelligent and Advanced Systems.Washington D.C.,USA:IEEE Press,2014:1-7. [6] JIANG Zongli,ZHANG Ting.Optimizing of local search ranking algorithm based on user behaviors analysis[J].Computer Technology and Development,2014,24(2):15-18,24.(in Chinese)蒋宗礼,张婷.基于用户行为分析的本地搜索排序算法优化[J].计算机技术与发展,2014,24(2):15-18,24. [7] HU Zhonggang,JIANG Minjuan.Information value mining based on user behavior analysis[J].Jiangsu Communication,2014,30(1):66-68.(in Chinese)胡仲刚,蒋敏娟.基于客户移动互联网行为的信息价值挖掘应用[J].江苏通信,2014,30(1):66-68. [8] SU Jibin,XIAO Zongshui,XIAO Yingjie.Analysis and implementation of risk assessment based on penetration chart[C]//Proceedings of CACIS 2008.Hefei:China Instrument and Meter Association,2008:1160-1166.(in Chinese)苏继斌,肖宗水,肖迎杰.一种基于渗透图的风险评估分析与实现[C]//全国第19届计算机技术与应用学术会议论文集.合肥:中国仪器仪表学会,2008:1160-1166. [9] YE Yun,XU Xishan,JIA Yan,et al.An attack graph-based probabilistic computing approach of network security[J].Chinese Journal of Computers,2010,33(10):1987-1996.(in Chinese)叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996. [10] ZHAO Bao.The study of network vulnerability based on attack graphs[D].Changsha:National University of Defense Technology,2009.(in Chinese)赵豹.基于攻击图的网络脆弱性分析技术研究[D].长沙:国防科学技术大学,2009. [11] WANG Hui,WANG Yunfeng,YAN Xixi.HTV analysis method for hierarchical threats degree using Bayesian attack graph[J].Computer Applications and Software,2016,33(7):287-293.(in Chinese)王辉,王云峰,闫玺玺.基于贝叶斯攻击图的层次化威胁度HTV分析方法[J].计算机应用与软件,2016,33(7):287-293. [12] LIU Shengwa,GAO Xiang,WANG Min.Application of attack graph method based on Bayesian network in network security assessment[J].Modern Electronics Technique,2013,36(9):84-87.(in Chinese)刘胜娃,高翔,王敏.基于贝叶斯网络的攻击图方法在网络安全评估中的应用[J].现代电子技术,2013,36(9):84-87. [13] WU Di,LIAN Yifeng,CHEN Kai,et al.A security threats identification and analysis method based on attack graph[J].Chinese Journal of Computers,2012,35(9):1938-1950.(in Chinese)吴迪,连一峰,陈恺,等.一种基于攻击图的安全威胁识别和分析方法[J].计算机学报,2012,35(9):1938-1950. [14] SU Huaan.The study of IDS alert correlation and prediction based on attack gragh[D].Changsha:National University of Defense Technology,2010.(in Chinese)苏华安.基于攻击图的IDS警报关联预测技术研究[D].长沙:国防科学技术大学,2010. [15] ZHAO Fangfang.Network security vulnerabilities detecting and attack gragh constructing[D].Shanghai:Shanghai Jiao Tong University,2008.(in Chinese)赵芳芳.计算机网络安全漏洞检测与攻击图构建的研究[D].上海:上海交通大学,2008. [16] LIU Qiang,YIN Jianping,CAI Zhiping,et al.Uncertain-graph based method for network vulnerability analysis[J].Journal of Software,2011,22(6):1398-1412.(in Chinese)刘强,殷建平,蔡志平,等.基于不确定图的网络漏洞分析方法[J].软件学报,2011,22(6):1398-1412. [17] ZHANG Aifang.Network multistage attack model and detection approach based on extended directed graph[D].Wuhan:Huazhong University of Science and Technology,2008.(in Chinese)张爱芳.基于扩展有向图的复合攻击模型及检测方法研究[D].武汉:华中科技大学,2008. [18] LUO Zhiyong,YOU Bo,XU Jiazhong,et al.Automatic recognition model of intrusive intention based on three layers attack graph[J].Journal of Jilin University(Engineering and Technology Edition),2014,44(5):1392-1397.(in Chinese)罗智勇,尤波,许家忠,等.基于三层攻击图的入侵意图自动识别模型[J].吉林大学学报(工学版),2014,44(5):1392-1397. [19] QIAN Quan,ZHU Wei,LAI Yanyan,et al.Host-based attack graph for attack recognition[J].Journal of Shanghai University(Natural Science Edition),2013,19(3):271-279.(in Chinese)钱权,朱伟,赖岩岩,等.基于主机攻击图的攻击识别[J].上海大学学报(自然科学版),2013,19(3):271-279. [20] HUANG Yonghong,WU Yifan,YANG Haopu,et al.Graph-based vulnerability assessment for APT attack[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2017,29(4):535-541.(in Chinese)黄永洪,吴一凡,杨豪璞,等.基于攻击图的APT脆弱节点评估方法[J].重庆邮电大学学报(自然科学版),2017,29(4):535-541. [21] HUANG Guangqiu,CHENG Kaige.Expanded Petri net attack model based on attack graph[J].Computer Engineering,2011,37(10):131-133.(in Chinese)黄光球,程凯歌.基于攻击图的扩充Petri网攻击模型[J].计算机工程,2011,37(10):131-133. |