Computer Science ›› 2016, Vol. 43 ›› Issue (1): 202-206.doi: 10.11896/j.issn.1002-137X.2016.01.045
Previous Articles Next Articles
DING Wei-tao and XU Kai-yong
[1] Rotondo S A.Trusted Computing Group[M]∥Encyclopedia of Cryptography and Security.2011:1331-1331 [2] Shen Chang-xiang,Zhang Huan-guo,Wang Huai-min,et al.Research and development of trusted computing [J] Chinese Science:Information Science,2010,40(2):139-166(in Chinese)沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166 [3] Qu Yan-wen.Software Behavior[M].Beijing:Publishing House of Electronics Industry,2004(in Chinese)屈延文.软件行为学[M].北京:电子工业出版社,2004 [4] Shen Guo-hua,Huang Zhi-qiu,Qian Ju,et al.Research on Software Trustworthiness Evaluation Model and Its Implementation[J].Journal of Frontiers of Computer Science and Technology ,2011,5(6):553-561(in Chinese)沈国华,黄志球,钱巨,等.软件可信评估模型及其工具实现[J].计算机科学与探索,2011,5(6):553-561 [5] Huang Jian-feng.Journal of Computer Research and Development[J].Electronics World,2014(16):374-374(in Chinese) 黄见峰.基于马尔可夫的软件可信评估模型研究[J].电子世界,2014(16):374-374 [6] Sekar R,Bendre M,Dhurjati D,et al.A fast automaton-basedmethod for detecting anomalous program behaviors[C]∥2001 IEEE Symposium on Security and Privacy(S&P 2001).IEEE,2001:144-155 [7] Li Zhen,Tian Jun-feng,Yang Xiao-hui.Dynamic Trustworthiness Evaluation Model of Software Based on Checkpoint’s Classification Attributes[J].Journal of Computer Research and Development,2013,50(11):2397-2405(in Chinese)李珍,田俊峰,杨晓晖.基于检查点分级属性的软件动态可信评测模型[J].计算机研究与发展,2013,50(11):2397-2405 [8] Fu J M,Tao F,Wang D,et al.Software behavior model based on system objects[J].Journal of Software,2011,22(11):2716-2728(in Chinese)傅建明,陶芬,王丹,等.基于对象的软件行为模型[J].软件学报,2011,22(11),2716-2728 [9] Zhang Xue-gong.Introduction To Statistical Learning TheoryAnd Support Vector Machines[J].Acta Automatica Sinica,2000,26(1):32-42(in Chinese)张学工.关于统计学习理论与支持向量机[J].自动化学报,2000,26(1):32-42 [10] Luo Qing-hua,Yan Xiao-zhen,Peng Yu,et al.A dynamic RSSI-based ranging method using pattern matching of slide window[J].Chinese Journal of Scientific Instrument,2015,36(3):499-506(in Chinese)罗清华,焉晓贞,彭宇,等.基于滑动窗口模式匹配的动态距离估计方法[J].仪器仪表学报,2015,36(3):499-506 [11] Peng N.A SVM reliability evaluation model for component-based software systems[C]∥2013 2nd International Symposium on Instrumentation and Measurement,Sensor Network and Automation (IMSNA).IEEE,2013:704-708 [12] Pirzadeh H,Hamou-Lhadj A.A software behaviour analysisframework based on the human perception systems:NIER track[C]∥2011 33rd International Conference on Software Enginee-ring (ICSE).IEEE,2011:948-951 [13] Sderstrm O,Moradian E.Secure Audit Log Management[J].Procedia Computer Science,2013,22:1249-1258 [14] Chen Song,Wang Guang-wei,Liu Xin-yu,et al.Research on the Evaluation of Information System Security[J].Communications Technology,2012,45(1):128-130(in Chinese)陈颂,王光伟,刘欣宇,等.信息系统安全风险评估研究[J].通信技术,2012,45(1):128-130 [15] Jsang A,Bradley D,Knapskog S J.Belief-based risk analysis[C]∥Proceedings of the second workshop on Australasian Information Security,Data Mining and Web Intelligence,and Software Internationalisation-Volume 32.Australian Computer Socie-ty,Inc.,2004:63-68 [16] Tian J F,Zhu Y.Trusted Software Construction Model Based on Trust Shell[J].Advanced Materials Research,2011,186:251-255 [17] Guo Jin-yu,Zhang Zhong-bin,Sun Qing-yun.Study and Application of Analytic Hierarchy Process[J].China Safety Science Journal,2008,18(5):148-153(in Chinese)郭金玉,张忠彬,孙庆云.层次分析法的研究与应用[J].中国安全科学学报,2008,18(5):148-153 [18] Shi L,Yang S.The evaluation of software trustworthiness with FAHP and FTOPSIS methods[C]∥International Conference on Computational Intelligence and Software Engineering,2009(CiSE 2009).IEEE,2009:1-5 [19] Tian Jun-feng,Zhang Ya-jiao.Checkpoint trust evaluation me-thod based on Markov[J].Journal on Communications,2015,36(1):230-236(in Chinese) 田俊峰,张亚姣.基于马尔可夫的检查点可信评估方法[J].通信学报,2015,36(1):230-236 [20] Hu Yong.Research on the Evaluation of Information System Security[D].Chengdu:Sichuan University,2007(in Chinese)胡勇.网络信息系统风险评估方法研究[D].成都:四川大学,2007 [21] Forrest S,Hofmeyr S A,Somayaji A,et al.A sense of self for unix processes[C]∥Proceedings of IEEE Symposium on Computer Security and Privacy.1996:120-128 [22] Xu Chan,Liu Xin,Wu Jian,et al.Software Behavior Evaluation System Based on BP Neural Network[J].Computer enginee-ring,2014,40(9):149-154(in Chinese)徐婵,刘新,吴建,等.基于 BP 神经网络的软件行为评估系统[J].计算机工程,2014,40(9):149-154 |
No related articles found! |
|