[1] BASS T. Intrusion detection systems & multisensor data fusion[J]. Communications of the ACM, 2000, 42(4):99-105. [2] 王坤,邱辉,杨豪璞.基于攻击模式识别的网络安全态势评估方法[J].计算机应用,2016,36(1):194-198.(WANG K, QIU H, YANG H P. Network security situation evaluation method based on attack pattern recognition[J]. Journal of Computer Applications, 2016, 36(1):194-198.) [3] KERAMATI M, AKBARI A, KERAMATI M. CVSS-based security metrics for quantitative analysis of attack graphs[C]//ICCKE 2013:Proceedings of the 2013 International Conference on Computer and Knowledge Engineering. Piscataway, NJ:IEEE, 2013:178-183. [4] 汪永伟,刘育楠,赵荣彩,等.基于改进证据理论的态势评估方法[J].计算机应用,2014,34(2):491-495.(WANG Y W, LIU Y N, ZHAO R C, et al. Situation assessment method based on improved evidence theory[J]. Journal of Computer Applications, 2014, 34(2):491-495.) [5] SZWED P, SKRZYNSKI P. A new lightweight method for security risk assessment based on fuzzy cognitive maps[J]. International Journal of Applied Mathematics and Computer Science, 2014, 24(1):213-225. [6] 陈丽莎.大规模网络安全态势评估模型研究[D].成都:电子科技大学,2008:27-49.(CHEN L S. Research on the model of large-scale network security situation awareness[D]. Chengdu:University of Electronic Science and Technology of China, 2008:27-49.) [7] ZHANG Y X, JIN S Y, CUI X, et al. Network security situation prediction based on BP and RBF neural network[C]//ISCTCS 2013:Proceedings of the 2013 International Standard Conference on Trustworthy Computing and Services. Berlin:Springer, 2013:659-665. [8] 黄亮亮.网络安全态势评估与预测方法的研究[D].兰州:兰州大学,2016:36-41.(HUANG L L. The study of assessment and prediction methods for network security situation[D]. Lanzhou:Lanzhou University, 2016:36-41.) [9] 吴昌友.神经网络的研究及应用[D].哈尔滨:东北农业大学,2007:8-28.(WU C Y. The research and application on neural network[D]. Harbin:Northeast Agriculture University, 2007:8-28.) [10] YANG X S. Nature-Inspired Metaheuristic Algorithms[M]. 2nd ed. Bristol, UK:Luniver Press, 2010:105-114. [11] CIVICIOGLU P, BESDOK E. A conceptual comparison of the cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms[J]. Artificial Intelligence Review, 2013, 39(4):315-346. [12] YI J H, XU W H, CHEN Y T. Novel back propagation optimization by cuckoo search algorithm[J]. The Scientific World Journal, 2014, 2014(1):Article ID 878262. [13] 韦勇.网络安全态势评估模型研究[D].合肥:中国科学技术大学,2009:65-69.(WEI Y. Research on network security situation awareness model[D]. Hefei:University of Science and Technology of China, 2009:65-69.) [14] 陶敬,马小博,赵娟,等.基于资源可用性的主机异常检测[J].电子科技大学学报,2007,36(s3):1449-1452.(TAO J, MA X B, ZHAO J, et al. A method for host abnormal detection based on resource availability[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(s3):1449-1452.) [15] 王小川.MATLAB神经网络43个案例分析[M].北京:北京航空航天大学出版社,2013:1-32.(WANG X C. MATLAB Neural Network 43 Case Analysis[M]. Beijing:Beihang University Press, 2013:1-32.) |