[1] BASS T. Multi-sensor data fusion for next generation distributed intrusion detection systems[C]// Proceedings of the 1999 IRIS National Symposium on Sensor and Data Fusion. Baltimore: Johns Hopkins University Press, 1999: 24-27. [2] DIGIOIA G, FOGLIETTA C, OLIVA G, et al. Aware online interdependency modeling via evidence theory[J]. International Journal of Critical Infrastructures, 2013, 9(1/2): 74-92. [3] LIU X, WANG H, YU H, et al. Quantitative awareness of network security situation based on fusion[J]. Journal of Jilin University: Engineering and Technology Edition,2013, 43(6): 1650-1657.(刘效武,王慧强,吕宏武,等.基于融合的网络安全态势量化感知[J].吉林大学学报:工学版,2013, 43(6): 1650-1657.) [4] HUANG C, TSENG T, FAN Y, et al. Alternative rule induction methods based on incremental object using rough set theory[J]. Applied Soft Computing, 2013,13(1): 372-389. [5] BAZAN J G, BAZAN-SOCHA S, BUREGWA-CZUMA S, et al. Classifiers based on data sets and domain knowledge: a rough set approach[J]. Intelligent Systems Reference Library, 2013, 43(2): 93-136. [6] LIU B, GAO L. Method of disease diagnosing based on SVM and rough set[J]. Advanced Materials Research, 2013(605/606/607): 887-890. [7] WANG H, GONG Z. Algorithm based on entropy for finding critical traffic matrices[J]. Journal of Software, 2009, 20(5):1377-1383.(王宏,龚正虎. 一种基于信息熵的关键流量矩阵发现算法[J]. 软件学报, 2009, 20(5):1377-1383.) [8] ZHUO Y, ZHANG Q, GONG Z. Research and implementation of network transmission situation awareness[C]// Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering. Piscataway: IEEE, 2009: 210-214. [9] WEI Y, LIAN Y, FENG D, et al. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353-362.(韦勇,连一峰,冯登国,等. 基于信息融合的网络安全态势评估模型[J]. 计算机研究与发展, 2009, 46(3):353-362.) [10] CHEN X, ZHENG Q, GUAN X, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885-897.(陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17(4): 885-897.) [11] WANG C, FANG L, WANG D, et al. Network security situation awareness system based on knowledge discovery[J]. Computer Science, 2012, 39(7):11-24.(王春雷,方兰,王东霞,等. 基于知识发现的网络安全态势感知系统[J]. 计算机科学, 2012, 39(7):11-24.) [12] XIE L, WANG Y, YU J. Network security situation awareness based on neural networks[J]. Journal of Tsinghua University: Science and Technology, 2013, 53(12): 1750-1760.(谢丽霞,王亚超,于巾博. 基于神经网络的网络安全态势感知[J]. 清华大学学报:自然科学版, 2013, 53(12): 1750-1760.) [13] LIU Y, FENG D, LIAN Y, et al. Network situation prediction method based on spatial-time dimension analysis[J]. Journal of Computer Research and Development, 2014, 51(8):1681-1694.(刘玉岭,冯登国,连一峰,等. 基于时空维度分析的网络安全态势预测方法[J]. 计算机研究与发展, 2014, 51(8):1681-1694.) |