Computer Science ›› 2018, Vol. 45 ›› Issue (10): 138-141.doi: 10.11896/j.issn.1002-137X.2018.10.026
• Information Security • Previous Articles Next Articles
LIU Jian-feng1, CHEN Jian2
CLC Number:
[1]LIU W F,ZHANG S W,GONG X.An Improved Network Risk Evaluation Method Based on Markov Game[J].Telecommunications Science,2014,30(7):13-18.(in Chinese) 刘文芬,张树伟,龚心.一种优化的基于Markov博弈理论的网络风险评估方法[J].电信科学,2014,30(7):13-18. [2]ZHANG J,WANG J D,ZHANG H W,et al.Network Risk Analysis Method Based on Node-Game Vulnerability Attack Graph[J].Computer Science,2014,41(9):169-173.(in Chinese) 张健,王晋东,张恒巍,等.基于节点博弈漏洞攻击图的网络风险分析方法[J].计算机科学,2014,41(9):169-173. [3]LEI J G.Simulation of Game Detection under Unbalanced Invasion Characteristics[J].Computer Simulation,2015,32(9):307-310.(in Chinese) 雷剑刚.不平衡网络入侵特征下的博弈检测仿真[J].计算机仿真,2015,32(9):307-310. [4]LAI C,CHEN X,CHEN X,et al.A fuzzy comprehensive evaluation model for flood risk based on the combination weight of game theory[J].Natural Hazards,2015,77(2):1243-1259. [5]GUI M Q,LIU Y B, ZHOU L Y.Intrusion detection based on game theory in wireless sensor network[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(3):414-420.(in Chinese) 桂明倩,刘宴兵,周嘹永.WSN中基于博弈理论的入侵检测研究[J].重庆邮电大学学报(自然科学版),2016,28(3):414-420. [6]REN L C, LI Z F.A New Model Based on the Games Theory and Fuzzy Mathematics in Bridge Engineering Risk Assessment[J].Highway Engineering,2017,42(1):163-169.(in Chinese) 任丽超,栗振锋.基于博弈论和模糊数学的桥梁风险评价模型[J].公路工程,2017,42(1):163-169. [7]YU D K,WANG J D,ZHANG H W,et al.Risk assessment selection based on static Bayesian game[J].Computer Engineering and Science,2015,37(6):1079-1086.(in Chinese) 余定坤,王晋东,张恒巍,等.基于静态贝叶斯博弈的风险评估方法研究[J].计算机工程与科学,2015,37(6):1079-1086. [8]XIE Q L.Design of wireless sensor network the sink node based on OK6410[J].Electronic Design Engineering,2016,24(6):159-161.(in Chinese) 谢巧玲.基于OK6410的无线传感器网络汇聚节点设计[J].电子设计工程,2016,24(6):159-161. [9]HAN L,SONG Y,DUAN L,et al.Risk assessment methodology for Shenyang Chemical Industrial Park based on fuzzy comprehensive evaluation[J].Environmental Earth Sciences,2015,73(9):5185-5192. [10]SHI L B,JIAN Z.ulnerability Assessment of Cyber Physical Power System Based on Dynamic Attack-defense Game Model[J].Automation of Electric Power Systems,2016,40(17):99-105.(in Chinese) 石立宝,简洲.基于动态攻防博弈的电力信息物理融合系统脆弱性评估[J].电力系统自动化,2016,40(17):99-105. [11]HUANG L L,YAO A L,XIAN T,et al.Research on risk assessment method of oil & gas pipeline with consideration of vulnerability[J].China Safety Science Journal,2014,24(7):93-99.(in Chinese) 黄亮亮,姚安林,鲜涛,等.考虑脆弱性的油气管道风险评估方法研究[J].中国安全科学学报,2014,24(7):93-99. [12]ZHANG H W,ZHANG J,HAN J H,et al.Vulnerability risk analysis method based on game model and risk matrix[J].Computer Engineering and Design,2016, 37(6):1421-1427.(in Chinese) 张恒巍,张健,韩继红,等.基于博弈模型和风险矩阵的漏洞风险分析方法[J].计算机工程与设计,2016,37(6):1421-1427. [13]ZHANG Y.Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information[J].Journal of Intelligent & Fuzzy Systems,2015,28(1):199-204. [14]XI R R,YUN X C,ZHANG Y Z,et al.An Improved Quantitative Evaluation Method for Network Security[J].Chinese Journal of Computers,2015,38(4):749-758.(in Chinese) 席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法[J].计算机学报,2015,38(4):749-758. [15]SONG Y U,CHENE J.Research of Aircraft Maintenance Unit Risk Management Based on the Generalized Linear Regression Model[J].Bulletin of Science and Technology,2016,32(1):215-219.(in Chinese) 宋云雪,陈金.基于广义线性回归模型的飞机维修单位风险管理研究[J].科技通报,2016,32(1):215-219. [16]DAI W.Application of Intrusion Detection Technology in Network Security[J].Journal of Chongqing Institute of Technology,2018,32(4):156-160,185.(in Chinese) 代威.入侵检测技术在网络安全中的应用[J].重庆理工大学学报(自然科学),2018,32(4):156-160,185. |
[1] | FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282. |
[2] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[3] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[4] | WU Gong-xing, Sun Zhao-yang, JU Chun-hua. Closed-loop Supply Chain Network Design Model Considering Interruption Risk and Fuzzy Pricing [J]. Computer Science, 2022, 49(7): 220-225. |
[5] | JIANG Sheng-teng, ZHANG Yi-chi, LUO Peng, LIU Yue-ling, CAO Kuo, ZHAO Hai-tao, WEI Ji-bo. Analysis of Performance Metrics of Semantic Communication Systems [J]. Computer Science, 2022, 49(7): 236-241. |
[6] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[7] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[8] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[9] | XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660. |
[10] | ZHU Xu-hui, SHEN Guo-jiao, XIA Ping-fan, NI Zhi-wei. Model Based on Spirally Evolution Glowworm Swarm Optimization and Back Propagation Neural Network and Its Application in PPP Financing Risk Prediction [J]. Computer Science, 2022, 49(6A): 667-674. |
[11] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[12] | LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302. |
[13] | ZHU Min, LIANG Zhao-hui, YAO Lin, WANG Xiang-kun, CAO Meng-qi. Survey of Visualization Methods on Academic Citation Information [J]. Computer Science, 2022, 49(4): 88-99. |
[14] | CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139. |
[15] | LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69. |
|