Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 340-343.doi: 10.11896/JsJkx.190500169
• Information Security • Previous Articles Next Articles
BAI Xue, Nurbol and WANG Ya-dong
CLC Number:
[1] CHEN Y,CHEN C M,LIU Z Y,et al.The methodology function of CiteSpace mapping knowledge domains .Studies in Science of Science,2015,33(2):242-253. [2] CHEN C M.CiteSpace II:Detecting and visualizing emerging trends and transient patterns in scientific literature .Journal of the Association for Information Science & Technology,2014,57(3):359-377. [3] CHEN H,CHEN G,BLASCH E.Analysis and visualization of large complex attack graphs for networks security//Defense &Security Symposium.International Society for Optics and Photonics,2007. [4] SALMON P M,STANTON N A,WALKER G H,et al.Is it really better to share? Distributed situation awareness and its implications for collaborative system design .Theoretical Issues in Ergonomics Science,2010,11(1/2):58-83. [5] BASS T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99-105. [6] SHIFFLET J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Mid states Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13-19. [7] ENDSLEY M R.Situation awareness misconceptions and misunderstandings.Journal of Cognitive Engineering & Decision Making,2015,9(1):4-32. [8] SHIRAVI H,SHIRAVI A,GHORBANI A A.A survey of visua-lization systems for network security .Visualization and Computer Graphics,2012,18(8):1313-1329. [9] GONG J,ZANG X D,SU Q,et al.Survey of Network Security Situation Awareness .Journal of Software,2017,28(4):1010-1026. [10] LIN H L,WANG Y Z,JIA Y T,et al.Network big data oriented knowledge fusion methods:A survey .Chinese Journal of Computers,2017,40(1):1-27. [11] FRANKE U,BRYNIELSSON J.Cyber situational awareness-A systematic review of the literature .Computers & Security,2014,46(1):18-31. [12] GUANG K,SHUO W,GUANGMING T.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction.Chinese Journal of Electronics,2019,28(1):162-171. [13] BEAVER J,STEED C,PATTON R,et al.Visualization techniques for computer network defense.Proc.of the SPIE Int’l Society for Optical Engineering,2011,8019(18):6-9. [14] WANG H Q,LAI J B,ZHU L,et al.Survey of network situation awareness system.Journal of Computer Science,2006,33(10):5-10. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220. |
[4] | KONG Shi-ming, FENG Yong, ZHANG Jia-yun. Multi-level Inheritance Influence Calculation and Generalization Based on Knowledge Graph [J]. Computer Science, 2022, 49(9): 221-227. |
[5] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[6] | QIN Qi-qi, ZHANG Yue-qin, WANG Run-ze, ZHANG Ze-hua. Hierarchical Granulation Recommendation Method Based on Knowledge Graph [J]. Computer Science, 2022, 49(8): 64-69. |
[7] | WANG Jie, LI Xiao-nan, LI Guan-yu. Adaptive Attention-based Knowledge Graph Completion [J]. Computer Science, 2022, 49(7): 204-211. |
[8] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[9] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[10] | MA Rui-xin, LI Ze-yang, CHEN Zhi-kui, ZHAO Liang. Review of Reasoning on Knowledge Graph [J]. Computer Science, 2022, 49(6A): 74-85. |
[11] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[12] | DU Xiao-ming, YUAN Qing-bo, YANG Fan, YAO Yi, JIANG Xiang. Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support [J]. Computer Science, 2022, 49(6A): 133-139. |
[13] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[14] | XIONG Zhong-min, SHU Gui-wen, GUO Huai-yu. Graph Neural Network Recommendation Model Integrating User Preferences [J]. Computer Science, 2022, 49(6): 165-171. |
[15] | ZHONG Jiang, YIN Hong, ZHANG Jian. Academic Knowledge Graph-based Research for Auxiliary Innovation Technology [J]. Computer Science, 2022, 49(5): 194-199. |
|