Computer Science ›› 2019, Vol. 46 ›› Issue (7): 102-107.doi: 10.11896/j.issn.1002-137X.2019.07.016
• Information Security • Previous Articles Next Articles
QI Bin,WANG Yu,ZOU Hong-xia,LI Ji-xing
CLC Number:
[1]CONTEH N Y,SCHMICK P J.Cybersecurity:risks,vulnerabi- lities and countermeasures to prevent social engineering attacks[J].International Journal of Advanced Research in Computer Science,2016,6(23):31-38.<br /> [2]GRATIAN M,BANDI S,CUKIER M,et al.Correlating Human Traits and Cybersecurity Behavior Intentions[J].Computers & Security,2018,73(3):345-358.<br /> [3]BASSETT G.System and method for cyber security analysis and human behavior prediction:US 20160205122. A1[P].2016-3-22.<br /> [4]YOUNG H,VLIET T V,VEN J V D,et al.Understanding Human Factors in Cyber Security as a Dynamic System[C]∥AHFE 2017:8th International Conference on Applied Human Factors and Ergonomics.Los Angeles,Springer,2017:244-254.<br /> [5]ZHANG H L,YU H N,FANG B X,et al.Research on China’s cyberspace security practice qualification system [J].Chinese Engineering Science,2016,18(6):44-48.(in Chinese)<br /> 张宏莉,于海宁,方滨兴,等.我国网络空间安全执业资格认证体系研究[J].中国工程科学,2016,18(6):44-48.<br /> [6]SMITS N,PAAP M C S,B HNKE J R.Some recommendations for developing multidimensional computerized adaptive tests for patient-reported outcomes[J].Quality of Life Research,2018,27(4):1055-1063.<br /> [7]GU Y,XU G.The Sufficient and Necessary Condition for the Identifiability and Estimability of the DINA Model[J].Psychometrika,2018(2):1-16.<br /> [8]TORRE J D L,MINCHEN N.Cognitively Diagnostic Assessments and the Cognitive Diagnosis Model Framework[J].Psicología Educativa,2014,20(2):89-97 [9]MCS P,KROEZE K A,TERWEE C B,et al.Item usage in a multidimensional computerized adaptive test (MCAT) measu-ring health-related quality of life[J].Quality Life of Research,2017,26(11):2909-2918.<br /> [10]RAJ R K,PARRISH A.Toward Standards in Undergraduate Cybersecurity Education in 2018[J].Computer,2018,51(2):72-75.<br /> [11]QI B,WANG Y,ZOU H X,et al.The Analysis of Measurement Method in the Knowledge System of Network Security Based on Information Entropy[C]∥ICCT 2017:17th IEEE International Conference on Communication Technology.Sichuan,China:IEEE Press,2017:1328-1333.<br /> [12]TU D B,CAI Y,DAI H Q,et al.A Polytomous Cognitive Diagnosis Model:P-DINA Model[J].Acta PsychologicaSinica,2010,42(10):1011-1020.(in Chinese)<br /> 涂冬波,蔡艳,戴海琦,等.一种多级评分的认知诊断模型:P-DINA模型的开发[J].心理学报,2010,42(10):1011-1020.<br /> [13]CAI Y,MIAO Y,TU D B.The polytomously scored cognitive diagnosis computerized adaptive testing[J].Acta PsychologicaSinica,2016,48(10):1338-1346.(in Chinese)<br /> 蔡艳,苗莹,涂冬波.多级评分的认知诊断计算机化适应测验[J].心理学报,2016,48(10):1338-1346.<br /> [14]XU G.Identifiability of restricted latent class models with binary responses[J].The Annals of Statistics,2017,45(2):675-707.<br /> [15]HSU C L,WANG W C,CHEN S Y.Variable-Length Computerized Adaptive Testing Based on Cognitive Diagnosis Models.[J].Applied Psychological Measurement,2013,37(7):563-582.<br /> [16]KAPLAN M,TORRE J D L,BARRADA J R.New Item Selec- tion Methods for Cognitive Diagnosis Computerized Adaptive Testing[J].Applied Psychological Measurement,2015,39(3):167-188. |
[1] | ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46. |
|