Computer Science ›› 2021, Vol. 48 ›› Issue (12): 349-356.doi: 10.11896/jsjkx.210400227
• Information Security • Previous Articles Next Articles
ZHAO Dong-mei1,2, SONG Hui-qian1, ZHANG Hong-bin3
CLC Number:
[1]ENDSLEY M R.Toward a Theory of Situation Awareness in Dynamic Systems[J].Human Actors:The Journal of the Human Factors and Ergonomics Society,1995,37(1):32-64. [2]BASS T.Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems [C]//1999 Proceedings of the Iris National Symposium on Sensor & Data Fusion.1999:24-27. [3]LIU X W,YU J G,LV W F,et al.Network security situation:from awareness to awareness-control[J].Journal of Network and Computer Applications,2019,139:15-30. [4]ZHENG W.Research on situation awareness of network security assessment based on dempster-shafer[J].MATEC Web of Conferences,2020,309(10):02004. [5]SUN W X.Pso and Svm for Network Security Situation Prediction[J].Computer Applications and Software,2019,36(6):308-316. [6]LIN W N,CHEN M Z,ZHAN Y Q,et al.Research on an Intrusion Detection Algorithm Based on PCA and Random-forest Classification[J].Netinfo Security,2017(11):50-54. [7]SHEN L,WEN Z C.Network security situation prediction in the cloud environment based on grey neural network[J].Journal of Computational Methods in Sciences and Engineering,2019,19(1):153-167. [8]LIU J W,LIU J J,LU Y L,et al.Application of game theory in network security situation awareness[J].Journal of Computer Applications,2017,37(S2):48-51. [9]ALAOUI I E,GAHI Y.Network Security Strategies in Big Data Context[J].Procedia Computer Science,2020,175:730-736. [10]WANG Z J,CHEN L,SONG S Y,et al.Automatic cyber security risk assessment based on fuzzy fractional ordinary differential equations[J].Alexandria Engineering Journal,2020,59(4):2725-2731. [11]DO C T,TRAN N H,HONG C,et al.Game Theory for Cyber Security and Privacy[J].ACM Computing Surveys,2017,50(2):1-37. [12]BALAJ S,JULIE E G,ROBINSON Y H,et al.Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model[J].Computer Standards & Interfaces,2019,66(OCT):103358.1-103358.10. [13]ZHAO D M,LIU J X.Study on network security situation awareness based on particle swarm optimization algorithm[J].Computers & Industrial Engineering,2018,125:764-775. [14]LI S,ZHAO D M.LSTM-based method for comprehension and evaluation of network security situation[C]//2019 18th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/13th IEEE International Confe-rence on Big Data Science and Engineering (TrustCom/BigDataSE).IEEE,2019:723-728. [15]CHEN J G,QI Z H,CHEN T F.Network security situation awareness based on RBF neural networks[J].Journal of Nanjing University of Posts and Telecommunications(Natural Scien-ce Edition),2019,39(4):88-95. [16]CHEN H S,CHEN J J.Recurrent Neural Networks Based Wireless Network Intrusion Detection and Classification Model Construction and Optimization[J].Journal of Electronics & Information Technology,2019,41(6):1427-1433. [17]DEMIR F,SENGUR A,BAJAJ V.Convolutional neural net- works based efficient approach for classification of lung diseases[J].Health Information Science and Systems,2020,8(1):1-8. [18]SYDNEY M K,SUN Y X.A deep learning method with wrapper based feature extraction for wireless intrusion detection system[J].Computers &Security,2020,92:101752.1-101752.15. |
[1] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[2] | YUE Qing, YIN Jian-yu, WANG Sheng-sheng. Automatic Detection of Pulmonary Nodules in Low-dose CT Images Based on Improved CNN [J]. Computer Science, 2022, 49(6A): 54-59. |
[3] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[4] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[5] | WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679. |
[6] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[7] | ZHAO Zheng-peng, LI Jun-gang, PU Yuan-yuan. Low-light Image Enhancement Based on Retinex Theory by Convolutional Neural Network [J]. Computer Science, 2022, 49(6): 199-209. |
[8] | TAN Zhen-qiong, JIANG Wen-Jun, YUM Yen-na-cherry, ZHANG Ji, YUM Peter-tak-shing, LI Xiao-hong. Personalized Learning Task Assignment Based on Bipartite Graph [J]. Computer Science, 2022, 49(4): 269-281. |
[9] | HUANG Xiao-sheng, XU Jing. Multi-focus Image Fusion Method Based on PCANet in NSST Domain [J]. Computer Science, 2021, 48(9): 181-186. |
[10] | XING Hao, LI Ming. Deepfake Video Detection Based on 3D Convolutional Neural Networks [J]. Computer Science, 2021, 48(7): 86-92. |
[11] | CUI Wen-hao, JIANG Mu-rong, YANG Lei, FU Peng-ming, ZHU Ling-xiao. Combining MCycleGAN and RFCNN to Realize High Resolution Reconstruction of Solar Speckle Image [J]. Computer Science, 2021, 48(6A): 38-42. |
[12] | LIU Han-qing, KANG Xiao-dong, LI Bo, ZHANG Hua-li, FENG Ji-chao, HAN Jun-ling. Comparative Study on Classification and Recognition of Medical Images Using Deep Learning Network [J]. Computer Science, 2021, 48(6A): 89-94. |
[13] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[14] | ZHONG Yue, FANG Hu-sheng, ZHANG Guo-yu, WANG Zhao, ZHU Jing-wei. Method of CNN Flag Movement Recognition Based on 9-axis Attitude Sensor [J]. Computer Science, 2021, 48(6): 153-158. |
[15] | SHU Xin, CHANG Feng, ZHANG Xin, DU Rui, YU Zhuan. Transverse Section Recognition Algorithm Based on BCNN for Fetal Craniocerebral Ultrasound [J]. Computer Science, 2021, 48(4): 151-156. |
|