[1] |
LENDERS V,TANNER A,BLARER A.Gaining an edge in cyberspace with advanced situational awareness[J].IEEE Security & Privacy,2015,13(2):65-74.
|
[2] |
GUAN Lei,HU Guangjun,WANG Zhuan.Research on network security situational awareness technology based on big data[J].Netinfo Security,2016,16(9):45-50.(in Chinese)管磊,胡光俊,王专.基于大数据的网络安全态势感知技术研究[J].信息网络安全,2016,16(9):45-50.
|
[3] |
GAI Weilin,XIN Dan,WANG Lu,et al.Review of date fusion and decision-making methods in situation awareness[J].Computer Engineering,2014,40(5):21-25,30.(in Chinese)盖伟麟,辛丹,王璐,等.态势感知中的数据融合和决策方法综述[J].计算机工程,2014,40(5):21-25,30.
|
[4] |
XI Rongrong,YUN Xiaochun,ZHANG Yongzheng,et al.An improved quantitative evaluation method for network security[J].Chinese Journal of Computers,2015,38(4):51-60.(in Chinese)席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法[J].计算机学报,2015,38(4):51-60.
|
[5] |
FRANKE U,BRYNIELSSON J.Cyber situational awareness:a systematic review of the literature[J].Computers & Security,2014,46:18-31.
|
[6] |
GONG Jian,ZANG Xiaodong,SU Qi,et al.Survey of network security situation awareness[J].Journal of Software,2017,28(4):1010-1026.(in Chinese)龚俭,臧小东,苏琪,等.网络安全态势感知综述[J].软件学报,2017,28(4):1010-1026.
|
[7] |
ADAM E C.Fighter cockpits of the future[C]//Proceedings of AIAA/IEEE Digital Avionics Systems Conference.Washington D.C.,USA:IEEE Press,1993:318-323.
|
[8] |
BASS T.Multisensor data fusion for next generation distributed intrusion detection systems[C]//Proceedings of the IRIS National Symposium on Sensor and Data Fusion.Washington D.C.,USA:IEEE Press,1999:24-27.
|
[9] |
HUANG Tongqing,ZHUANG Yi.An approach to real-time network security situation prediction[J].Journal of Chinese Computer Systems,2014,35(2):303-306.(in Chinese)黄同庆,庄毅.一种实时网络安全态势预测方法[J].小型微型计算机系统,2014,35(2):303-306.
|
[10] |
FARHADI H,AMIRHAERI M,KHANSARI M.Alert correlation and prediction using data mining and HMM[J].ISeCure,2011,3(2):77-101.
|
[11] |
FACHKHA C,BOU-HARB E,DEBBABI M.Towards a forecasting model for distributed denial of service activities[C]//Proceedings of the 12th International Symposium on Network Computing and Applications.Washington D.C.,USA:IEEE Press,2013:110-117.
|
[12] |
YAN G,LEE R,KENT A,et al.Towards a Bayesian network game framework for evaluating DDoS attacks and defense[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:553-566.
|
[13] |
ZHANG Yong,TAN Xiaobin,CUI Xiaolin.Network security situation awareness approach based on Markov game model[J].Journal of Software,2011,22(3):495-508.(in Chinese)张勇,谭小彬,崔孝林.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508.
|
[14] |
TAN Yubo,ZHAO Meng,DENG Miaolei.Research and simulation of optimal assessment of network security situation[J].Computer Simulation,2018,35(3):210-215.(in Chinese)谭玉波,赵孟,邓淼磊.网络安全态势优化评估研究与仿真[J].计算机仿真,2018,35(3):210-215.
|
[15] |
ZHANG Jianfeng,HAN Weihong,JIA Yan.Interactive approach to eliciting user's preference using comparison[C]//Proceedings of the 4th IEEE International Conference on Computational and Information Sciences.Washington D.C.,USA:IEEE Press,2012:497-500.
|
[16] |
ANSHELEVICH E,SEKAR S.Blind,greedy,and random:algorithms for matching and clustering using only ordinal information[C]//Proceedings of the 13th AAAI Conference on Artificial Intelligence.Palo Alto,USA:AAAI Press,2016:383-389.
|
[17] |
ANSHELEVICH E,POSTL J.Randomized social choice functions under metric preferences[J].Journal of Artificial Intelligence Research,2017,58:797-827.
|
[18] |
PROCACCIA A D,ROSENSCHEIN J S.The distortion of cardinal preferences in voting[C]//Proceedings of International Workshop on Cooperative Information Agents.Berlin,Germany:Springer,2006:317-331.
|
[19] |
BREMNER D,FUKUDA K,MARZETTA A.Primal:dual methods for vertex and facet enumeration[J].Discrete & Computational Geometry,1998,20(3):333-357.
|
[20] |
BORZSONY S,KOSSMANN D,STOCKER K.The skyline operator[C]//Proceedings of the 17th International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2001:421-430.
|