1 |
席荣荣,云晓春,金舒原,等.网络安全态势感知研究综述[J].计算机应用, 2012, 32(1): 1-4, 59.
|
2 |
杨昕,李更新,李挥. EHFM:一种面向多源网络攻击告警的高效层级化数据过滤方案[J].计算机科学, 2023, 50(2): 324-332.
|
3 |
李泽慧,徐沛东,邬阳,等.基于大数据的网络安全态势感知平台应用研究[J].计算机应用与软件, 2023, 40(7): 337-341.
|
4 |
BASS T. Intrusion detection systems and multisensor data fusion [J]. Communications of the ACM, 2000, 43(4): 99-105.
|
5 |
赵志岩,纪小默.智能化网络安全威胁感知融合模型研究[J].信息网络安全, 2020, 20(4): 87-93.
|
6 |
CHADANI Y, KASHIBAYASHI T, YAMAMOTO T, et al. Association of right precuneus compression with apathy in idiopathic normal pressure hydrocephalus: a pilot study [J]. Scientific Reports, 2022, 12: No.20428.
|
7 |
张克君,郑炜,于新颖,等.基于PSO-TSA模型的网络安全态势要素识别研究[J].湖南大学学报(自然科学版), 2022, 49(4): 119-127.
|
8 |
常利伟,刘秀娟,钱宇华,等.基于卷积神经网络多源融合的网络安全态势感知模型[J].计算机科学, 2023, 50(5): 382-389.
|
9 |
SOKOL P, STAŇA R, GAJDOŠ A, et al. Network security situation awareness forecasting based on statistical approach and neural networks [J]. Logic Journal of the IGPL, 2023, 31(2): 352-374.
|
10 |
简玲,叶天鹏,林祥,等.多源融合的大数据网络安全态势感知平台研究与探索[J].信息网络安全, 2020(S2): 139-143.
|
11 |
MOSHKIN V, YARUSHKINA N. Modeling user portrait using psycholinguistic analysis of social media data [C]// Proceedings of the 2021 International Science and Technology Conference "FarEastСon 2021", SIST 275. Singapore: Springer, 2022: 389-399.
|
12 |
HOVORUSHCHENKO T, MEDZATYI D, KVANITSKYI D, et al. Characteristics and method of forming the user information portrait [C]// Proceedings of the 12th International Conference on Dependable Systems, Services and Technologies. Piscataway: IEEE, 2022: 1-6.
|
13 |
WU F, LYU F, REN J, et al. Characterizing internet card user portraits for efficient churn prediction model design [J]. IEEE Transactions on Mobile Computing, 2024, 23(2): 1735-1752.
|
14 |
高世乐,王滢,李海林,等.基于矩阵画像的金融时序数据预测方法[J].计算机应用, 2021, 41(1): 199-207.
|
15 |
PAN Z, SHAO L, SONG X, et al. Attack portrait and replay based on multi-spatial data in grid system [C]// Proceedings of the 2021 International Conference on Signal and Information Processing, Network and Computers, LNEE 895. Singapore: Springer, 2022: 267-274.
|
16 |
郭娜,魏荣凯,沈焱萍.基于用户画像的大数据环境中异常特征提取[J].计算机仿真, 2020, 37(8): 332-336.
|
17 |
张昊,杨晓林,袁琪.基于流量大数据的IP画像和异常行为检测算法研究[J].电力信息与通信技术, 2022, 20(7): 58-64.
|
18 |
MIN T, CAI W. Portrait of decentralized application users: an overview based on large-scale Ethereum data [J]. CCF Transactions on Pervasive Computing and Interaction, 2022, 4(2): 124-141.
|
19 |
SHENG J, FANG Y, ZHANG G, et al. Cross-domain data link security portrait based attack traceability correlation [C]// Proceedings of the 4th International Seminar on Artificial Intelligence, Networking and Information Technology. Piscataway: IEEE, 2023: 303-306.
|
20 |
EKE C I, NORMAN A A, SHUIB L, et al. A survey of user profiling: state-of-the-art, challenges, and solutions [J]. IEEE Access, 2019, 7: 144907-144924.
|
21 |
徐雅斌,王振超,庄唯.基于命令的黑客画像构建与攻击者识别方法[J].北京信息科技大学学报(自然科学版), 2023, 38(2): 61-68.
|
22 |
袁非牛,章琳,史劲亭,等.自编码神经网络理论及应用综述[J].计算机学报, 2019, 42(1): 203-230.
|
23 |
University of New South Wales. The UNSW-NB15 dataset [DS/OL]. [2023-10-10]. .
|
24 |
University of California. KDD Cup 1999 data [DS/OL]. [2024-03-19]. .
|
25 |
洪飞,廖光忠.基于K-Medoide聚类的黑客画像预警模型[J].计算机工程与设计, 2021, 42(5): 1244-1249.
|
26 |
ZHANG P, TIAN G, DONG H. Research on network intrusion detection based on whitening PCA and CNN [C]// Proceedings of the 7th International Conference on Smart Grid and Smart Cities. Piscataway: IEEE, 2023: 232-237.
|