[1] BASS T. Intrusion detection systems & multisensory data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105. [2] D'AMBROSIO B. Security Situation Assessment and Response Evaluation (SSARE) [C]// DISCEX'01: Proceedings of 2001 DARPA Information Survivability Conference & Exposition. Washington, D.C.: IEEE Computer Society, 2001: 387-394. [3] ABAD C, YURCIK W. UCLog+: a security situational awareness system for incident storage, querying, and correlation [C]// ICTSM 2006: Proceedings of the 14th International Conference on Telecommunication Systems Modeling and Analysis. Washington, D.C.: IEEE Computer Society, 2006: 316-322. [4] 陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-997.(CHEN X Z, ZHENG Q H, GUAN X H, et al. Quantitative hierarchical threat evaluation model for network security [J]. Journal of software, 2006, 17(4): 885-997.) [5] 张建锋.网络安全态势评估若干关键技术研究[D].长沙:国防科学技术大学,2013:19-35.(ZHANG J F. Research on key technologies of network security assessment [D]. Changsha: National University of Defense Technology, 2013:19-35.) [6] 李方伟,杨绍成,朱江.基于模糊层次法的改进网络安全态势评估方法[J].计算机应用,2014,34(9):2622-2626.(LI F W, YANG S C, ZHU J. Improved network security situational assessment method based on FAHP [J]. Journal of computer applications, 2014, 34(9): 2622-2626.) [7] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362.(WEI Y, LIAN Y F, FENG D G. A network security situational awareness model based on information fusion [J]. Journal of computer research and development, 2009, 46(3): 353-362.) [8] 席荣荣,云晓春,张永铮.基于环境属性的网络威胁态势量化评估方法[J].软件学报,2015,26(7):1638-1649.(XI R R, YUN X C, ZHANG Y Z. Quantitative threat situational assessment based on contextual information [J]. Journal of software, 2015, 26(7): 1638-1649.) [9] 张勇,谭笑彬,崔孝林,等.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508.(ZHANG Y, TAN X B, CUI X L, et al. Network security situation awareness approach based on Markov game model [J]. Journal of software, 2011, 22(3): 495-508.) [10] 席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法[J].计算机学报,2015,38(4):749-758.(XI R R, YUN X C, ZHANG Y Z, et al. An improved quantitative evaluation method for network security [J]. Chinese journal of computers, 2015, 38(4): 749-758.) [11] 吕慧颖,彭武,王瑞梅,等.基于时空关联分析的网络实时威胁识别与评估[J].计算机研究与发展,2014,51(5):1039-1049.(LYU H Y, PENG W, WANG R M, et al. A real-time network threat recognition and assessment method based on association analysis of time and space [J]. Journal of computer research and development, 2014, 51(5): 1039-1049.) [12] ONWUBIKO C, OWENS T. Situational awareness in computer network defense principles, methods and applications [M]. Hershey: IGI Global Snippet, 2012: 125-137. [13] 赖积保.基于异构传感器的网络安全态势感知若干关键技术研究[D].哈尔滨:哈尔滨工程大学,2009:54-73.(LAI J B. Research on some key technologies for heterogeneous sensors-based network [D]. Harbin: Harbin Engineering University, 2009:54-73.) [14] KAVOUSI F, AKBARI B. Automatic learning of attack behavior patterns using Bayesian networks [C]// IST'2012: Proceedings of the 6th International Symposium on Telecommunications. Washington, D.C.: IEEE Computer Society, 2012: 999-1004. [15] 韦勇,连一峰.基于日志审计与性能修正算法的网络安全态势评估模型[J].计算机学报,2009,32(4):763-772.(WEI Y, LIAN Y F. A network security situational awareness model based on log audit and performance correction [J]. Chinese journal of computers, 2009, 32(4): 763-772.) |