[1] 李思东.计算机网络安全探讨与研究分析[J].电子技术与软件工程,2016(14):213.(LI S D. Discussion and analysis of computer network security[J]. Electronic Technology & Software Engineering, 2016(14):213.) [2] 冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. (FENG D G, ZHANG Y, ZHANG Y Q. Survey of information security risk assessment[J].Journal of China Institute of Communications,2004,25(7):10-18.) [3] 张凤荔,冯波.基于关联性的漏洞评估方法[J].计算机应用研究,2014,31(3):811-814. (ZHANG F L, FENG B. Vulnerability assessment based on correlation[J]. Application Research of Computers,2014,31(3):811-814.) [4] 谢丽霞,江典盛,张利,等.漏洞威胁的关联评估方法[J].计算机应用,2012,32(3):679-682.(XIE L X, JIANG D S, ZHANG L, et al. Vulnerability threat correlation assessment method[J]. Journal of Computer Applications,2012,32(3):679-682.) [5] 黎学斌,范九伦,刘意先.基于AHP和CVSS的信息系统漏洞评估[J].西安邮电大学学报,2016,21(1):42-46.(LI X B, FAN J L, LIU Y X. On information system vulnerabilities assess based on analytic hierarchy process and common vulnerability score system[J]. Journal of Xi'an University of Posts and Telecommunications,2016,21(1):42-46.) [6] 付志耀,高岭,孙骞,等. 基于粗糙集的漏洞属性约简及严重性评估[J]. 计算机研究与发展,2016,53(5):1009-1016.(FU Z Y, GAO L, SUN Q, et al. Evaluation of vulnerability severity based on rough sets and attributes reduction[J]. Journal of Computer Research and Development,2016,53(5):1009-1016.) [7] 张小红,裴道武,代建华,等.模糊数学与Rough集理论[M].北京:清华大学出版社,2013:205-269.(ZHANG X H, PEI D W, DAI J H, et al. Fuzzy Mathematics and Rough Set Theory[M]. Beijing:Tsinghua University Press, 2013:205-269.) [8] 范渊,刘志乐,王吉文.一种基于模糊粗糙集的网络态势评估方法研究[J].信息网络安全,2015(9):58-61.(FAN Y, LIU Z L, WANG J W. Research on network situation assessment method based on fuzzy rough set[J]. Netinfo Security,2015(9):58-61.) [9] ZIARKO W. Variable precision rough set model[J]. Journal of Computer & System Sciences, 1993,46(1):39-59. [10] 黄卫华,杨国增,陆亚哲,等.变精度粗糙集模型研究[J]. 河北北方学院学报(自然科学版),2015,31(4):8-10.(HUANG W H, YANG G Z, LU Y Z, et al. Model of variable precision rough set[J]. Journal of Hebei North University(Natural Science Edition),2015,31(4):8-10.) [11] 张国荣,王治和,周涛.变精度粗糙集模型与应用[J].太原师范学院学报(自然科学版),2010,9(4):14-17.(ZHANG G R, WANG Z H, ZHOU T. Variable precision rough set model and application[J]. Journal of Taiyuan Normal University (Natural Science Edition), 2010,9(4):14-17.) [12] 林春杰,韩晓琴.基于VPRS的网络安全威胁评估方法[J].信息通信,2011(4):27-28.(LIN C J, HAN X Q. A method based on network security threats assessment[J]. Information & Communication,2011(4):27-28.) [13] 刘静,何贤芳.基于Rough集的集成离散化算法[J].重庆三峡学院学报,2010,26(3):59-63.(LIU J, HE X F. A discretization algorithm based on rough set[J]. Journal of Chongqing Three Gorges University, 2010,26(3):59-63.) [14] 张冬雯,张学杰,仇计清.改进的k-means算法在入侵检测中的应用[J]. 微计算机信息,2010,26(18):11-13. (ZHANG D W, ZHANG X J, QIU J Q. Application of improved k-means algorithm in intrusion detection[J]. Microcomputer Information,2010,26(18):11-13.) [15] 陈秀真,郑庆华,管晓宏,等.基于粗糙集理论的主机安全评估方法[J].西安交通大学学报,2004,38(12):1228-1231.(CHEN X Z, ZHENG Q H, GUAN X H, et al. Approach to security evaluation based on rough set theory for host computer[J]. Journal of Xi'an Jiaotong University,2004,38(12):1228-1231.) JIANG Yang, born in 1992, M.S. candidate. His research interests include network and information security.LI Chenghai, born in 1966, M.S., professor. His research interests include network and information security. |