Computer Science ›› 2019, Vol. 46 ›› Issue (4): 83-88.doi: 10.11896/j.issn.1002-137X.2019.04.013

• Network & Communication • Previous Articles     Next Articles

Design Method of Semantic-driven Cyberspace Resource Symbol

ZHANG Long, ZHOU Yang, TIAN Jiang-peng, ZHAO Hai-peng   

  1. Institute of Geography Spatial Information,Information Engineering University,Zhengzhou 450000,China
  • Received:2018-02-28 Online:2019-04-15 Published:2019-04-23

Abstract: Cyberspace resource is the basic unit of cognitive cyberspace.Systematic and structured symbol system of network resources is significant for correctly understanding the cyberspace situation,rapidly sharing and identifying cyberspace situation mapping and objectively grasping the distribution,state and attribution of cyberspace resources.Therefore,referring to the design method of semantic-driven mapping symbol,this paper introduced natural semantics theory into the process of symbol design of cyberspace resources,and proposed a design method of semantic-driven symbol cyberspace resources.Firstly,the paper analyzed and sorted out the cyberspace resource structure,and proposed the cyberspace resource symbol structure and symbolic semantic model.Then,it elaborated the symbolic design process and the method of cyberspace resources.Finally,it conducted the cyberspace resource symbolic cognition experiment and comparison analysis with the US military cyberspace symbol.The experimental results show that the symbol of cyberspace resources designed by this method has the characteristics of visualization and systematization.

Key words: Cyberspace resource, Semantic-driven, Semantic model, Symbol design, Cognitive experiment

CLC Number: 

  • TP393
[1]ZHOU Y,XU Q,LUO X Y,et al.Research on the Definition and Technological System of Cyberspace Surveying and Mapping[J].Computer Science,2018,45(5):1-7.(in Chinese) 周杨,徐青,罗向阳,等.网络空间测绘的概念及其技术体系的研究[J].计算机科学,2018,45(5):1-7.
[2]ZHAO F,LUO X Y,LIU F L.Research on cyberspace sur- veying and mapping technology[J].Chinese Journal of Network and Information Security,2016,2(9):1-11.(in Chinese) 赵帆,罗向阳,刘粉林.网络空间测绘技术研究[J].网络与信息安全学报,2016,2(9):1-11.
[3]GAO J.Let’s Take Another Look at Map[J].Bulletin of Surveying and Mapping,2009,2009(1):1-5.(in Chinese) 高俊.换一个视角看地图[J].测绘通报,2009,2009(1):1-5.
[4]JIAO D,ZHANG H T,LV G N,et al.Coupling of map symbol web service and web map service[J].Journal of Image and Graphic,2013,18(9):1190-1196.(in Chinese) 焦东来,张海涛,闾国年,等.地图符号服务与地图服务的耦合[J].中国图象图形报,2013,18(9):1190-1196.
[5]MIL-STD-2525D.Joint military symbology[S].
[6]NOEL S,JACOBS M,KALAPA P,et al.Multiple Coordinated Views for Network Attack Graphs[C]∥ Visualization for Computer Security.IEEE,2008:99-106.
[7]SENEKAL F P,VORSTER J S.Network mapping and usage determination[C]∥Military Information and Communications Symposium of South Africa (MICSSA).CSIR Conference Centre,Pretoria,South Africa,2007.
[8]FEREBEE D,DASGUPTA D,SCHMIDT M,et al.Security visualization:Cyber security storm map and event correlation[C]∥Computational Intelligence in Cyber Security.IEEE,2011:171-178.
[9]BECKER R,EICK S,WILK A.Visualizing network data[J].IEEE Transactions on Visualization and Computer Graphics,2006,12(5):693-700.
[10]MANSMAN F,MEIER L,KEIM D A.Visualization of Host Behavior for Network Security[M]∥Goodall JR,Conti G,Ma KL,eds.VizSEC 2007.Springer,Berlin,Heidelberg,2008:187-202.
[11]CANDELA M,BARTOLOMEO M D,BATTISTA G D,et al.Radian:Visual Exploration of Traceroutes[J].IEEE Transactions on Visualization & Computer Graphics,2017,PP(99):1.
[12]JIANG H,LIU Y,MATTHEWS J N.IP geolocation estimation using neural networks with stable landmarks[C]∥Computer Communications Workshops.IEEE,2016:170-175.
[13]DU Q Y.The Linguistic Features of Spatial Information and Its Mechanism of Automatic Understanding[D].Wuhan:Wuhan University,2001.(in Chinese) 杜清运.空间信息的语言学特征及其自动理解机制研究[D].武汉:武汉大学,2001.
[14]TIAN J P.Research on Design and Expression of 3D Symbology Based on Linguisitics[D].Zhengzhou:PLA Information Engineering University,2012.(in Chinese) 田江鹏.基于语言学的三维符号设计与表达研究[D].郑州:解放军信息工程大学,2012.
[15]TIAN J P,JIA F L,XIA Q,et al.Design Method of the Semantic-driven Hierarchical Map Symboles[J].Journal of Geo-Information Science,2012,14(6):736-743.(in Chinese) 田江鹏,贾奋励,夏青,等.语义驱动的层次化地图符号设计方法[J].地球信息科学学报,2012,14(6):736-743.
[16]TIAN J P,YOU X,JIA F L,et al.Cognitive Semantic Analysis and Dynamic Generation of Cartographic Symbols[J].Acta Geodaetica et Cartographica Sinica,2017,46(7),928-938.(in Chinese) 田江鹏,游雄,贾奋励,等.地图符号的认知语义分析与动态生成[J].测绘学报,2017,46(7):928-938.
[17]LI W,CHEN Y F,QIAN L T,et al.Personalized Map Symbol Design Merchanism Based on Linguistics[J].Acta Geodaetica et Cartographica Sinica,2015,44(3):323-329.(in Chinese) 李伟,陈毓芬,钱凌韬,等.语言学的个性化地图符号设计[J].测绘学报,2015,44(3):323-329.
[18]HAN S,LIANG D D.WU X.Automatic Matching of Tourism Resource Thematic Symbols Based on Semantic[J].Science of Surveying and Mapping,2016,41(5):143-146.(in Chinese) 韩爽,梁栋栋,吴旭.旅游资源专题语义符号自动匹配[J].测绘学报,2016,41(5):143-146.
[1] TANG Ying, ZHONG Nan-jiang, SUN Kang-gao, QIN Da-kang and ZHOU Wei-hua. Clustering and Visualization of Social Network Based on User Interests [J]. Computer Science, 2017, 44(Z11): 385-390, 427.
[2] ZHU Xian-wei, ZHU Zhi-qiang and SUN Lei. Design and Formal Verification of Xen Hybrid Multi-police Model [J]. Computer Science, 2017, 44(10): 134-141.
[3] . Research of the Battlefield Tracking Information Sharing Based on Ontology [J]. Computer Science, 2012, 39(2): 22-25.
[4] LUAN Xi-dao,XIE Yu-xiang,TAN Yi-hong,CHEN Zhi-ping,ZHAO Bi-hai,HU Sai. Research Development of Multimedia Semantic Model [J]. Computer Science, 2010, 37(11): 1-6.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[6] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111, 142 .
[7] WANG Shuai, LIU Juan, BI Yao-yao, CHEN Zhe, ZHENG Qun-hua and DUAN Hui-fang. Automatic Recognition of Breast Gland Based on Two-step Clustering and Random Forest[J]. Computer Science, 2018, 45(3): 247 -252 .
[8] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[9] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .
[10] LIAO Xing, YUAN Jing-ling and CHEN Min-cheng. Parallel PSO Container Packing Algorithm with Adaptive Weight[J]. Computer Science, 2018, 45(3): 231 -234, 273 .