[1] 杨光. 我国将出台网络安全审查制度[J]. 计算机与网络,2014(10):6-6.(YANG G. China will introduce a network security review system[J]. Computer and Network,2014(10):6-6.) [2] 习近平. 没有网络安全就没有国家安全[EB/OL].[2019-03-22]. http://www.cac.gov.cn/2018-12/27/c_1123907720.htm. (XI J P. No network security,no national security[EB/OL].[2019-03-22]. http://www.cac.gov.cn/2018-12/27/c_1123907720.htm.) [3] 杨艳萍, 叶锡庆, 张明安, 等. 战场网络战基本模型研究[J]. 系统仿真学报,2011,23(5):1015-1020,1038.(YANG Y P,YE X Q,ZHANG M A,et al. Research on basic models for battlefield network war[J]. Journal of System Simulation,2011,23(5):1015-1020,1038.) [4] 石磊, 潘平俊, 李铮, 等. 网络战装备综合效能评估框架[J]. 现代防御技术,2008,36(4):1-5.(SHI L,PAN P J,LI Z,et al. Architecture of integrative effectiveness evaluation of equipments in net war environment[J]. Modern Defence Technology,2008,36(4):1-5.) [5] 王辉, 陈泓予, 刘淑芬. 基于改进朴素贝叶斯算法的入侵检测系统[J]. 计算机科学,2014,41(4):111-115,119.(WANG H, CHEN H Y,LIU S F. Intrusion detection system based on improved naive Bayesian algorithm[J]. Computer Science,2014,41(4):111-115,119.) [6] 谭爱平, 陈浩, 吴伯桥. 基于SVM的网络入侵检测集成学习算法[J]. 计算机科学,2014,41(2):197-200.(TAN A P,CHEN H, WU B Q. Network intrusion intelligent detection algorithm based on AdaBoost[J]. Computer Science,2014,41(2):197-200.) [7] 杨宏宇, 王峰岩. 基于改进卷积神经网络的网络入侵检测模型[J]. 计算机应用,2019,39(9):2604-2610.(YANG H Y, WANG F Y. Network intrusion detection model based on improved convolutional neural network[J]. Journal of Computer Applications,2019,39(9):2604-2610.) [8] 陈万志, 徐东升, 张静, 等. 结合优化支持向量机与K-means++的工控系统入侵检测方法[J]. 计算机应用,2019,39(4):1089-1094.(CHEN W Z,XU D S,ZHANG J,et al. Intrusion detection method for industrial control system with optimized support vector machine and K-means ++[J]. Journal of Computer Applications, 2019,39(4):1089-1094.) [9] 张新有, 曾华燊, 贾磊. 入侵检测数据集KDD CUP99研究[J]. 计算机工程与设计,2010,31(22):4809-4812,4816.(ZHANG X Y,ZENG H S,JIA L. Research of intrusion detection system dataset-KDD CUP99[J]. Computer Engineering and Design,2010, 31(22):4809-4812,4816.) [10] 池亚平, 莫崇维, 杨垠坦, 等. 面向软件定义网络架构的入侵检测模型设计与实现[J]. 计算机应用,2020,40(1):116-122. (CHI Y P,MO C W,YANG Y T,et al. Design and implementation of intrusion detection model for software defined network architecture[J]. Journal of Computer Applications,2020,40(1):116-122.) [11] FRANK A,ASUNCION A. UC Irvine machine learning repository[DB/OL].[2019-08-19]. http://archive.ics.uci.edu/ml. [12] 程光权, 陆永中, 张明星, 等. 复杂网络节点重要度评估及网络脆弱性分析[J]. 国防科技大学学报,2017,39(1):120-127. (CHENG G Q,LU Y Z,ZHANG M X,et al. Node importance evaluation and network vulnerability analysis on complex network[J]. Journal of National University of Defense Technology,2017, 39(1):120-127.) [13] 刘建国, 任卓明, 郭强, 等. 复杂网络中节点重要性排序的研究进展[J]. 物理学报,2013,62(17):No. 178901. (LIU J G, REN Z M,GUO Q, et al. Node importance ranking of complex networks[J]. Acta Physica Sinica,2013,62(17):No. 178901.) [14] 高建召. PageRank用在无向图上[EB/OL].[2019-03-22]. http://wap.sciencenet.cn/blog-468005-1051894.html. (GAO J Z. PageRank for undirected graphs[EB/OL].[2019-03-22]. http://wap.sciencenet.cn/blog-468005-1051894.html. [15] 崔良中, 郭福亮, 杨光明. 军队保密工作风险评估模型研究[J]. 网络空间安全,2016,7(5):15-19,31.(CUI L Z,GUO F L,YANG G M. Research on the risk assessment model of military confidential work[J]. Cyberspace Security,2016,7(5):15-19,31.) [16] XIA Y,YANG X,ZHANG Y. A rejection inference technique based on contrastive pessimistic likelihood estimation for P2P lending[J]. Electronic Commerce Research and Applications,2018, 30:111-124. [17] SARKAR T K,JI Z,KIM K,et al. A survey of various propagation models for mobile communication[J]. IEEE Antennas and Propagation Magazine,2003,45(3):51-82. [18] 王思宇, 陈建平. 基于LightGBM算法的信用风险评估模型研究[J]. 软件导刊,2019,18(10):19-22.(WANG S Y,CHEN J P. Research on credit risk assessment model based on lightGBM algorithm[J]. Software Guide,2019,18(10):19-22.) [19] 莫坤, 王娜, 李恒吉, 等. 基于LightGBM的网络入侵检测系统[J]. 信息安全研究,2019,5(2):152-156.(MO K,WANG N, LI H J,et al. Network intrusion detection system based on lightGBM[J]. Research on Information Security, 2019, 5(2):152-156.) [20] 赵丹玲, 谭跃进, 李际超, 等. 基于作战环的武器装备体系贡献度评估[J]. 系统工程与电子技术,2017,39(10):2239-2247. (ZHAO D L,TAN Y J,LI J C,et al. Armament system of systems contribution evaluation based on operation loop[J]. Systems Engineering and Electronics,2017,39(10):2239-2247.) |