[1] QING Sihan,JIANG Jianchun,MA Hengtai,et al.Research on intrusion detection techniques:a survey[J].Journal on Communications,2004,25(7):19-29.(in Chinese)卿斯汉,蒋建春,马恒太,等.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. [2] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-6.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-6. [3] GONG Zhenghu,ZHUO Ying.Research on cyberspace situational awareness[J].Journal of Software,2010,21(7):1605-1619.(in Chinese)龚正虎,卓莹.网络态势感知研究[J].软件学报,2010,21(7):1605-1619. [4] ZHANG Yong,TANG Xiaobin,CUI Xiaolin,et al.Network security situation awareness approach based on Markov game model[J].Journal of Software,2011,22(3):495-508.(in Chinese)张勇,谭小彬,崔孝林,等.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508. [5] XIE Lixia,WANG Yachao,YU Jinbo.Research on network security situational awareness based on neural network[J].Journal of Tsinghua University(Science and Technology),2013,53(12):1750-1760.(in Chinese)谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知研究[J].清华大学学报(自然科学版),2013,53(12):1750-1760. [6] ZHAO Guosheng,WANG Huiqiang,WANG Jian.A situation awareness model of network security based on gray Verhulst model[J].Journal of Harbin Institute of Technology,2008,40(5):798-801.(in Chinese)赵国生,王慧强,王健.基于灰色Verhulst的网络安全态势感知模型[J].哈尔滨工业大学学报,2008,40(5):798-801. [7] LIU Jian,SU Purui,YANG Min,et al.Software and cyber security:a survey[J].Journal of Software,2018,29(1):42-68.(in Chinese)刘剑,苏璞睿,杨珉,等.软件与网络安全研究综述[J].软件学报,2018,29(1):42-68. [8] ENDSLEY M R.Design and evaluation for situation awareness enhancement[J].Proceedings of the Human Factors and Ergonomics Society Annual Meeting,1988,32(2):97-101. [9] ENDSLEY M R.Situation awareness global assessment technique[C]//Proceedings of IEEE National Aerospace and Electronics Conference.Washington D.C.,USA:IEEE Press,1988:789-795. [10] BASS T.Multisensor data fusion for next generation distributed intrusion detection systems[C]//Proceedings of the IRIS National Symposium on Sensor and Data Fusion.Laurel,USA:[s.n.],1999:24-27. [11] BASS T.Intrusion detection systems and multisensor data fusion:create cyberspace situation awareness[J].Communications of the ACM,2000,43(4):99-105. [12] GONG Jian,ZANG Xiaodong,SU Qi.Survey of network security situation awareness[J].Journal of Software,2017,28(4):1010-1026.(in Chinese)龚俭,臧小东,苏琪.网络安全态势感知综述[J].软件学报,2017,28(4):1010-1026. [13] WANG Wei,ZENG Junjie,LI Guangsong,et al.Security analysis of dynamic heterogeneous redundant system[J].Computer Engineering,2018,44(10):42-45,50.(in Chinese)王伟,曾俊杰,李光松,等.动态异构冗余系统的安全性分析[J].计算机工程,2018,44(10):42-45,50. [14] ZHOU Zhihua.Machine learning[M].Beijing:Tsinghua University Press,2016.(in Chinese)周志华.机器学习[M].北京:清华大学出版社,2016. [15] LI Shuohao,ZHANG Jun.Review of Bayesian networks structure learning[J].Application Research of Computers,2015,32(3):641-646.(in Chinese)李硕豪,张军.贝叶斯网络结构学习综述[J].计算机应用研究,2015,32(3):641-646. [16] HU Chunling.Research overview on Bayesian network[J].Journal of Hefei University(Natural Science),2013,23(1):33-40.(in Chinese)胡春玲.贝叶斯网络研究综述[J].合肥学院学报(自然科学版),2013,23(1):33-40. [17] WU Hong,WANG Weiping,YANG Feng.Discretization method of continuous variables in Bayesian network parameter learning[J].Systems Engineering and Electronics,2012,34(10):2157-2162.(in Chinese)吴红,王维平,杨峰.贝叶斯网络参数学习中的连续变量离散化方法[J].系统工程与电子技术,2012,34(10):2157-2162. [18] BRADSHAW J M,CARVALHO M,BUNCH L,et al.Sol:an agent-based framework for cyber situation awareness[J].KI-Künstliche Intelligenz,2012,26(2):127-140. [19] LAI Jibao,WANG Ying,WANG Huiqiang,et al.Research on network security situation awareness system architecture based on multi-source heterogeneous sensors[J].Computer Science,2011,38(3):144-149.(in Chinese)赖积保,王颖,王慧强,等.基于多源异构传感器的网络安全态势感知系统结构研究[J].计算机科学,2011,38(3):144-149. [20] CHEN Xinzhen,ZHENG Qinghua,GUAN Xiaohong,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,2006,17(4):885-897.(in Chinese)陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. |