Computer Science ›› 2019, Vol. 46 ›› Issue (6): 148-152.doi: 10.11896/j.issn.1002-137X.2019.06.022
Previous Articles Next Articles
ZHANG Jie-hui1, PAN Chao2, ZHANG Yong1
CLC Number:
[1]YUAN X,FENG Z Y,XU W J,et al.Secure connectivity analysis in unmanned aerial vehicle networks [J].Frontiers of Information Technology & Electronic Engineering,2018,19(3):409-422. [2]MOVAHEDI Z,HOSSEINI Z,BAYAN F,et al.Trust-distor-tion resistant trust management frameworks on mobile ad hoc networks:a survey[J].IEEE Communications Surveys & Tutorials,2016,18(2):1287-1309. [3]HAN G J,JIANG J F,SHU L,et al.An attack-resistant trust model based on multi-dimensional trust metrics in underwater acoustic sensor network[J].IEEE Tansactions Mob Computer,2017,14(12):2447-2459. [4]LIU Q,CAI Z P,YIN J P,et al.Frameworks and methods of cybersecurity detection[J].Computer Engineering & Science,2017,39(12):2224-2229.(in Chinese) 刘强,蔡志平,殷建平,等.网络安全检测框架与方法研究[J].计算机工程与科学,2017,39(12):2224-2229. [5]HUANG Q L,MA Z F,YANG Y X,et al.Improving Security and Efficiency for Encrypted Data Sharing in Online Social Networks[J].Information Security,2018,28(7):104-114. [6]FU Y,YU Y H,CHEN Y Q,et al.Network Security Analysis on Attack-defense Behavior Tree[J].Journal of Sichuan University (Engineering Science Edition),2017,49(2):115-120.(in Chinese) 付钰,俞艺涵,陈永强,等.基于攻防行为树的网络安全态势分析[J].工程科学与技术,2017,49(2):115-120. [7]HU H,YE R G,ZHANG H Q,et al.Quantitative method for network security situation based on attack prediction [J].Journal on Communications,2017,38(10):122-134.(in Chinese) 胡浩,叶润国,张红旗,等.基于攻击预测的网络安全态势量化方法[J].通信学报,2017,38(10):122-134. [8]CHEN Y L,TANG G M,SUN Y F.Assessment of Network Se-curity Situation Based on Immune Danger Theory[J].Computer Science,2015,42(6):167-170.(in Chinese) 陈妍伶,汤光明,孙怡峰.基于免疫危险理论的网络安全态势评估[J].计算机科学,2015,42(6):167-170. [9]LIU J W,LIU J J,LU Y L,et al.Application of game theory in network security situation awareness [J].Journal of Computer Applications,2017,37(S2):48-51,64.(in Chinese) 刘景玮,刘京菊,陆余良,等.博弈论在网络安全态势感知中的应用[J].计算机应用,2017,37(S2):48-51,64. [10]WEN Z C,CHEN Z G,TANG J.Network Security Assessment Method Based on Cluster Analysis [J].Journal of Shanghai Jiaotong University,2016,50(9):1407-1414,1421.(in Chinese) 文志诚,陈志刚,唐军.基于聚类分析的网络安全态势评估方法[J].上海交通大学学报,2016,50(9):1407-1414,1421. [11]MALEKI H,VALIZADEH M H,KOCH W,et al.Markov modeling of moving target defense games [C]∥Proceedings of the 2016 ACM Workshop on Moving Target Defense.ACM,2016:81-91. [12]GE H H,XIAO D,CHEN T P,et al.Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating [J].Journal of Electronics & Information Technology,2013,35(11):2630-2636.(in Chinese) 葛海慧,肖达,陈天平,等.基于动态关联分析的网络安全风险评估方法[J].电子与信息学报,2013,35(11):2630-2636. [13]HUANG J M,ZHANG H W,WANG J D,et al.Defense strategies selection based on attack defense evolutionary game model[J].Information Science,2017,38(1):168-176.(in Chinese) 黄健明,张恒巍,王晋东,等.基于攻防演化博弈模型的防御策略选取方法[J].通信学报,2017,38(1):168-176. [14]WEN Z C,CHEN Z G,TANG J.Assessing network security situation quantitatively based on information fusion[J].Journal of Beijing University of Aeronautics and Astronautics,2016,42(8):1593-1602.(in Chinese) 文志诚,陈志刚,唐军.基于信息融合的网络安全态势量化评估方法[J].北京航空航天大学学报,2016,42(8):1593-1602. [15]HUANG J M,ZHANG H W.A Method for Selecting Defense Strategies Based on Stochastic Evolutionary Game Model[J].Acta Electronica Sinica,2018,46(9):2222-2228.(in Chinese) 黄健明,张恒巍.基于随机演化博弈模型的网络防御策略选取方法[J].电子学报,2018,46(9):2222-2228. [16]WHITE J,PARK J S,KAMHOUA C A,et al.Game theoretic attack analysis in online social network services [C]∥Proceedings of the 2017 International Conference on Social Networks Technology.IEEE,2017:1012-1019. [17]LIPPMANN R,HAINES J W.Analysis and results of the DARPA off-line intrusion detection evaluation [C]∥Proceedings of the 17th International Workshop on Recent Advances in Intrusion Detection.New York:ACM,2016:162-182. [18]WU G,CHEN L,SI Z G,et al.An index optimization model for network security situation evaluation [J].Computer Enginee-ring & Science,2017,39(5):861-869.(in Chinese) 吴果,陈雷,司志刚,等.网络安全态势评估指标体系优化模型研究[J].计算机工程与科学,2017,39(5):861-869. [19]CHENG J T,AI L,DUAN Z M.Transformer fault diagnosis based on improved evidence theory and neural network integra-ted method [J].Power System Protection and Control,2013,41(14):92-96.(in Chinese) 程加堂,艾莉,段志梅.改进证据理论与神经网络集成的变压器故障诊断[J].电力系统保护与控制,2013,41(14):92-96. LI F W,ZHENG B,ZHU J,et al.A method of network security situation prediction based on AC-RBF neural network.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2014,26(5):576-581.(in Chinese) 李方伟,郑波,朱江,等.一种基于AC-RBF神经网络的网络安全态势预测方法.重庆邮电大学学报(自然科学版),2014,26(5):576-581. |
[1] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[2] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[3] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[4] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55. |
[7] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[8] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[9] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[10] | QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24. |
[11] | YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63. |
[12] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
[13] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[14] | LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131. |
[15] | XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141. |
|