Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 514-517.doi: 10.11896/jsjkx.200700158
• Information Security • Previous Articles Next Articles
TANG Liang, LI Fei
CLC Number:
[1] Annual report ofintelligent connected vehicles in 2019[OL].https://skygo.360.cn/2020/03/24/360-skygo-2019-icv-cybersecurity-annual-report/. [2] LI X H,ZHONG C,CHEN Y,et al.Overview of Internet of vehicles security [J].Journal of Information Security,2019,4(3):17-33. [3] CHANG Y H,MA Z R,LI X,et al.Overview of network security situation awareness [J].Cyberspace Security,2019,10 (12):88-93. [4] ENDSLEY M R.Situation Awareness Global Assessment Technique(SAGAT)[C]//Proceedings of the IEEE 1988 National Aerospaceand Electronics Conference.Piscataway:IEEE,1988:789-795. [5] BASS T.Intrusion detection systems &multisensor data fusion:cre-ating cyberspace situational awareness[J].Communications of the ACM,1999,43(4):99-105. [6] LIU J W,LIU J J,LU Y L,et al.Application of game theory in network security situation awareness [J].Computer Applications,2017,37 (S2):48-51,64. [7] DING H,XU H H,DUAN R,et al.Security situation awareness model based on Bayesian method [J/OL].Computer Engineering:1-12.[2020-04-16].https://doi.org/10.19678/j.issn.1000-3428.0055219. [8] JIANG Y,LI C H,WEI X H,et al.Research on network security situation prediction based on Improved PSO and optimized RBF [J].Measurement and Control Technology,2018,37(5):56-60. [9] LI X.Research on network security situation evaluation based on particle swarm optimization neural network [D].Hebei Normal University,2018 [10] XU G,CAO Y,REN Y,et al.Network Security SituationAwareness Based on Semantic Ontology and User-Defined Rules for Internet of Things[C]//IEEE Access.2017:21046-21056. [11] HE F,ZHANG Y,LIU H.A Novel Approach for Security Situational Awareness in the Internet of Things[J].arXiv:1711.10182,2017. [12] MCELWEE S,CANNADY J.Cyber Situation Awareness withActive Learning for Intrusion Detection[J].arXiv:1912.12673,2019. [13] PENG K,LEUNG V C M,ZHENG L X,et al.Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment[OL].https://doi.org/10.1155/2018/4680867. [14] Machine learning [M].Tsinghua University Press,2016:425. [15] https://sites.google.com/a/hksecurity.net/ocslab/Datasets/da-tachallenge2019/car. |
[1] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[2] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[3] | LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114. |
[4] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[5] | DING Si-fan, WANG Feng, WEI Wei. Relief Feature Selection Algorithm Based on Label Correlation [J]. Computer Science, 2021, 48(4): 91-96. |
[6] | DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184. |
[7] | ZOU Jie, ZHU Guo-sheng, QI Xiao-yun and CAO Yang-chen. HTTPS Encrypted Traffic Classification Method Based on C4.5 Decision Tree [J]. Computer Science, 2020, 47(6A): 381-385. |
[8] | ZHU Di-chen, XIA Huan, YANG Xiu-zhang, YU Xiao-min, ZHANG Ya-cheng and WU Shuai. Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis [J]. Computer Science, 2020, 47(6A): 530-534. |
[9] | WANG Hai-tao, SONG Li-hua, XIANG Ting-ting, LIU Li-jun. New Development Direction of Artificial Intelligence-Human Cyber Physical Ternary Fusion Intelligence [J]. Computer Science, 2020, 47(11A): 1-5. |
[10] | DONG Ben-qing, LI Feng-kun. Analysis of Emotional Degree of Poetry Reading Based on WDOUDT [J]. Computer Science, 2020, 47(11A): 46-51. |
[11] | LV Ming-qi, LI Yi-fan, CHEN Tie-ming. Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming [J]. Computer Science, 2019, 46(1): 265-270. |
[12] | XU Zhao-zhao, LI Ching-hwa, CHEN Tong-lin, LEE Shin-jye. Naive Bayesian Decision TreeAlgorithm Combining SMOTE and Filter-Wrapper and It’s Application [J]. Computer Science, 2018, 45(9): 65-69. |
[13] | DAI Ming-zhu,GAO Song-feng. Research on Data Mining Algorithm Based on Examination Process and Knowledge Structure [J]. Computer Science, 2018, 45(6A): 437-441. |
[14] | SHI Zhi-kai,ZHU Guo-sheng,LEI Long-fei,CHEN Sheng,ZHEN Jia,WU Shan-chao,WU Meng-yu. NAT Device Detection Method Based on C5.0 Decision Tree [J]. Computer Science, 2018, 45(6A): 323-327. |
[15] | LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree [J]. Computer Science, 2018, 45(4): 157-162. |
|