[1] 韦勇,连一峰,冯登国,等.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362.(WEI Y, LIAN Y F, FENG D G. A network security situational awareness model based on information fusion [J]. Journal of computer research and development, 2009, 46(3): 353-362.) [2] BASS T. Intrusion detection systems & multi-sensor data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43: 99-105. [3] 徐茹枝,常太华,吕广娟,等.基于时间序列的网络安全态势预测方法的研究[J].数学的实践与认识,2010,40(12):124-131.(XU R Z, CHANG T H, LYU G J, et al. The research on prediction posture based method of network security on time series [J]. Mathematics in practice and theory, 2010, 40(12): 124-131.) [4] YAN Z, LIU Z, DENG G. An approach to evaluating the network security in triangular fuzzy environment [J]. International journal of digital content technology and its applications, 2012, 6(19): 410-416. [5] 王庚,张景辉,吴娜.网络安全态势预测方法的应用研究[J].计算机仿真,2012,29(2):98-101.(WANG G, ZHANG J, WU N. Application research on network security situation prediction method [J]. Computer simulation, 2012, 29(2): 98-101.) [6] 张安楠,苏旸.基于小波变换的网络安全态势复合预测方法[J].计算机仿真,2014,31(6):282-286.(ZHANG A N, SU Y. Research on hybrid prediction method for network security situation based on wavelet transform [J]. Computer simulation, 2014, 31(6): 282-286.) [7] LEE C M, KO C N. Time series prediction using RBF neural networks with a nonlinear time-varying evolution PSO algorithm [J]. Neurocomputing, 2009, 73(1): 449-460. [8] LI Y, JING J. A method of improved support vector machine for network security situation forecasting [J]. Advanced materials research, 2011, 187: 291-296. [9] ZHANG S, LI B, WANG B. The application of an improved integration algorithm of support vector machine to the prediction of network security situation [C]// Applied mechanics and materials. 2014, 513: 2285-2288. [10] SONG G. Computer network security and precaution evaluation based on incremental relevance vector machine algorithm and ACO [J]. International journal on advances in information sciences and service sciences, 2013, 5(1): 120-127. [11] TIPPING M E. Sparse Bayesian learning and the relevance vector machine [J]. Journal of machine learning research, 2001, 1: 211-244. [12] GEEM Z W, KIM J H, LOGANATHAN G V. A new heuristic optimization algorithm: harmony search [J]. Simulation, 2001, 76(2): 60-68. [13] ZOU D, GAO L, LI S, et al. An effective global harmony search algorithm for reliability problems [J]. Expert systems with applications, 2011, 38(4): 4642-4648. [14] Honeynet Project. Know your enemy; statistics. 2001 [EB/OL]. [2015-05-10]. http://old..org/papers/stats/. [15] 肖汉杰,桑秀丽.相关向量机超参数优化的网络安全态势预测[J].计算机应用,2015,35(7):1888-1891.(XIAO H J, SANG X L. Network security situation prediction based on hyper parameter optimization of RVM [J]. Journal of computer applications, 2015, 35(7): 1888 -1891.) [16] 陈虹,王飞,肖振久,等.基于IHS_RELM的网络安全态势预测方法[J].计算机科学,2013,40(11):108-111.(CHEN H, WANG F, XIAO Z J, et al. Method of network security situation prediction based on IHS_RELM [J]. Computer science, 2013, 40(11): 108-111.) [17] 陈虹,王飞,肖振久.基于PSO_SVR的网络安全态势预测方法[J].计算机应用与软件,2014,31(8):292-294.(CHEN H, WANG F, XIAO Z J. Network security situation prediction on method based on PSO_SVR [J]. Computer applications and software, 2014, 31(8): 292-294.). |