计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 340-343.doi: 10.11896/JsJkx.190500169
白雪, 努尔布力, 王亚东
BAI Xue, Nurbol and WANG Ya-dong
摘要: 文中以Web of Science中1999-2019年收录的2456篇以网络安全态势感知为主题的文献作为数据来源,主要运用 CiteSpace可视化工具,基于图谱对国家与机构合作、文献共被引、关键词共现等进行分析,并分析了国际上该领域的研究热点及研究脉络。研究发现,网络安全态势感知在理论方面需要加强形成体系,并进一步深入研究;应用方面对于多源数据融合的研究较为成熟,但对态势实时感知可视化方面提出了更多的挑战。文中分析结果有助于为该领域的研究人员做进一步深层研究提供参考。
中图分类号:
[1] CHEN Y,CHEN C M,LIU Z Y,et al.The methodology function of CiteSpace mapping knowledge domains .Studies in Science of Science,2015,33(2):242-253. [2] CHEN C M.CiteSpace II:Detecting and visualizing emerging trends and transient patterns in scientific literature .Journal of the Association for Information Science & Technology,2014,57(3):359-377. [3] CHEN H,CHEN G,BLASCH E.Analysis and visualization of large complex attack graphs for networks security//Defense &Security Symposium.International Society for Optics and Photonics,2007. [4] SALMON P M,STANTON N A,WALKER G H,et al.Is it really better to share? Distributed situation awareness and its implications for collaborative system design .Theoretical Issues in Ergonomics Science,2010,11(1/2):58-83. [5] BASS T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99-105. [6] SHIFFLET J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Mid states Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13-19. [7] ENDSLEY M R.Situation awareness misconceptions and misunderstandings.Journal of Cognitive Engineering & Decision Making,2015,9(1):4-32. [8] SHIRAVI H,SHIRAVI A,GHORBANI A A.A survey of visua-lization systems for network security .Visualization and Computer Graphics,2012,18(8):1313-1329. [9] GONG J,ZANG X D,SU Q,et al.Survey of Network Security Situation Awareness .Journal of Software,2017,28(4):1010-1026. [10] LIN H L,WANG Y Z,JIA Y T,et al.Network big data oriented knowledge fusion methods:A survey .Chinese Journal of Computers,2017,40(1):1-27. [11] FRANKE U,BRYNIELSSON J.Cyber situational awareness-A systematic review of the literature .Computers & Security,2014,46(1):18-31. [12] GUANG K,SHUO W,GUANGMING T.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction.Chinese Journal of Electronics,2019,28(1):162-171. [13] BEAVER J,STEED C,PATTON R,et al.Visualization techniques for computer network defense.Proc.of the SPIE Int’l Society for Optical Engineering,2011,8019(18):6-9. [14] WANG H Q,LAI J B,ZHU L,et al.Survey of network situation awareness system.Journal of Computer Science,2006,33(10):5-10. |
[1] | 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺. 时序知识图谱表示学习 Temporal Knowledge Graph Representation Learning 计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204 |
[2] | 饶志双, 贾真, 张凡, 李天瑞. 基于Key-Value关联记忆网络的知识图谱问答方法 Key-Value Relational Memory Networks for Question Answering over Knowledge Graph 计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277 |
[3] | 吴子仪, 李邵梅, 姜梦函, 张建朋. 基于自注意力模型的本体对齐方法 Ontology Alignment Method Based on Self-attention 计算机科学, 2022, 49(9): 215-220. https://doi.org/10.11896/jsjkx.210700190 |
[4] | 孔世明, 冯永, 张嘉云. 融合知识图谱的多层次传承影响力计算与泛化研究 Multi-level Inheritance Influence Calculation and Generalization Based on Knowledge Graph 计算机科学, 2022, 49(9): 221-227. https://doi.org/10.11896/jsjkx.210700144 |
[5] | 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠. 基于战术关联的网络安全风险评估框架 Network Security Risk Assessment Framework Based on Tactical Correlation 计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171 |
[6] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[7] | 秦琪琦, 张月琴, 王润泽, 张泽华. 基于知识图谱的层次粒化推荐方法 Hierarchical Granulation Recommendation Method Based on Knowledge Graph 计算机科学, 2022, 49(8): 64-69. https://doi.org/10.11896/jsjkx.210600111 |
[8] | 王杰, 李晓楠, 李冠宇. 基于自适应注意力机制的知识图谱补全算法 Adaptive Attention-based Knowledge Graph Completion 计算机科学, 2022, 49(7): 204-211. https://doi.org/10.11896/jsjkx.210400129 |
[9] | 赵冬梅, 吴亚星, 张红斌. 基于IPSO-BiLSTM的网络安全态势预测 Network Security Situation Prediction Based on IPSO-BiLSTM 计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103 |
[10] | 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏. 基于网络媒体的非线性动力学信息传播模型 Nonlinear Dynamics Information Dissemination Model Based on Network Media 计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043 |
[11] | 陶礼靖, 邱菡, 朱俊虎, 李航天. 面向网络安全训练评估的受训者行为描述模型 Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment 计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048 |
[12] | 马瑞新, 李泽阳, 陈志奎, 赵亮. 知识图谱推理研究综述 Review of Reasoning on Knowledge Graph 计算机科学, 2022, 49(6A): 74-85. https://doi.org/10.11896/jsjkx.210100122 |
[13] | 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓. 一种可快速迁移的领域知识图谱构建方法 Fast and Transmissible Domain Knowledge Graph Construction Method 计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018 |
[14] | 杜晓明, 袁清波, 杨帆, 姚奕, 蒋祥. 军事指控保障领域命名实体识别语料库的构建 Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support 计算机科学, 2022, 49(6A): 133-139. https://doi.org/10.11896/jsjkx.210400132 |
[15] | 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳. 基于进化神经网络的电力信息网安全态势量化方法 Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network 计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151 |
|