[1] 林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45(12):2033-2043. (LIN C, TIAN L Q, WANG Y Z. Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008, 45(12):2033-2043.) [2] 田立勤. 网络用户行为的安全可信分析与控制[M]. 北京:清华大学出版社, 2011:8. (TIAN L Q. Security Trusted Analysis and Control of Network User Behavior[M]. BeiJing:Tsinghua University Press, 2011:8.) [3] 陈恩红, 陈玉莹, 潘镇. 用户序列行为分析研究与应用综述[J]. 安徽大学学报(自然科学版), 2018, 42(5):39-51. (CHEN E H, CHEN Y Y, PAN Z. A survey of research and application of user's sequential behavior analysis[J]. Journal of Anhui University (Natural Science Edition), 2018, 42(5):39-51.) [4] 郭渊博, 刘春辉, 孔菁, 等. 内部威胁检测中用户行为模画像方法研究[J]. 通信学报, 2018, 39(12):141-150。(GUO Y B, LIU C H, KONG J, et al. Study on user behavior profiling in insider threat detection[J]. Journal on Communications, 2018, 39(12):141-150.) [5] 吕艳霞, 田立勤, 孙珊珊. 云计算环境下基于FANP的用户行为的可信评估与控制分析[J]. 计算机科学, 2013, 40(1):132-135, 138. (LYU Y X, TIAN L Q, SUN S S. Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment[J]. Computer Science, 2013, 40(1):132-135, 138.) [6] 张佳乐, 张秀芳, 张桂玲. 基于模糊综合策略的用户行为评估方法[J]. 计算机技术与发展, 2017, 27(5):138-143. (ZHANG J L, ZHANG X F, ZHANG G L. User behavior evaluation in trusted network based on fuzzy comprehensive strategy[J]. Computer Technology and Development, 2017, 27(5):138-143.) [7] 胡计鹏, 谭励, 杨明华, 等. 一种基于可信密码模块的用户行为度量方法[J]. 计算机工程, 2017, 43(5):121-128. (HU J P, TAN L, YANG M H, et al. A user behavior measurement method based on trusted cryptography module[J]. Computer Engineering, 2017, 43(5):121-128.) [8] YANG M, ZHANG S, ZHANG H, et al. A new behavior evaluation method in online social network[J]. Journal of Information Security and Applications, 2019, 47:217-222. [9] 王晓菊, 田立勤, 赵竟雄. 基于物联网的用户行为认证机制与分析[J]. 南京理工大学学报, 2015, 39(1):70-77. (WANG X J, TIAN L Q, ZHAO J X. User behavioral authentication mechanism and analysis based on IoT[J]. Journal of Nanjing University of Science and Technology, 2015, 39(1):70-77.) [10] 成路肖, 阎继宁, 焦阳, 等. 基于贝叶斯网络的遥感云用户行为认证方法[J]. 计算机应用研究, 2019, 36(2):441-445. (CHENG L X, YUAN J N, JIAO Y, et al. Bayesian network method for remote sensing cloud user behavior authentication[J]. Application Research of Computers, 2019, 36(2):441-445.) [11] 雷璟. 用户行为特征提取及安全预警建模技术[J]. 中国电子科学研究院学报, 2019, 14(4):368-372. (LEI J. User behavior feature selection and security early warning and modeling technology[J]. Journal of China Academy of Electronics and Information Technology, 2019, 14(4):368-372.) [12] 陈亮, 曾荣仁, 李峰, 等. 基于无干扰理论的信任链传递模型[J]. 计算机科学, 2016, 43(10):141-144, 181. (CHEN L, ZENG R R, LI F, et al. Trust chain transfer model based on non-interference theory[J]. Computer Science, 2016, 43(10):141-144, 181.) [13] 谢洪安, 刘大福, 苏旸, 等. 基于无干扰理论的云服务行为可信模型[J]. 计算机应用, 2016, 36(10):2728-2732. (XIE H A, LIU D F, SU Y, et al. Cloud service behavior trust model based on non-interference theory[J]. Journal of Computer Applications, 2016, 36(10):2728-2732.) |