Computer Science ›› 2018, Vol. 45 ›› Issue (1): 245-248.doi: 10.11896/j.issn.1002-137X.2018.01.043
Previous Articles Next Articles
TANG Zan-yu and LIU Hong
[1] ZHANG K.Big Data Network Intrusion Traces of Process Data Monitoring Method Research[J].Science Technology and Engineering,2016,6(14):254-258.(in Chinese) 张凯.大数据网络入侵过程的痕迹数据监测方法研究[J].科学技术与工程,2016,6(14):254-258. [2] TIAN G W.Optimal Identification Algorithm for Virus Attack in Super Dense Network[J].Bulletin of Science and Technology,2016,2(6):145-148.(in Chinese) 田关伟.超密集网络中病毒攻击优化识别算法[J].科技通报,2016,2(6):145-148. [3] ZHANG J L.Network Security Risk Dynamic Evaluation MethodResearch[J].Computer Simulation,2016,3(10):356-360.(in Chinese) 张俊林.网络安全风险动态评估方法研究[J].计算机仿真,2016,3(10):356-360. [4] WANG G H.Research on Network Security Situation Awareness Based on Genetic Algorithm[J].Computer Measurement & Control,2016,4(12):155-157.(in Chinese) 王国华.基于遗传算法的网络安全态势感知研究[J].计算机测量与控制,2016,4(12):155-157. [5] HUANG H J.Network security evaluation based on cloud computing[J].Electronic Design Engineering,2016,4(12):115-117.(in Chinese) 黄海军.基于云计算的网络安全评估[J].电子设计工程,2016,4(12):115-117. [6] WANG X,LI Q M,QI Y.Real Time Analysis Method of Network Security Risk Based on Markov Model[J].Computer Scien-ce,2016,3(S2):338-341.(in Chinese) 王笑,李千目,戚湧.一种基于马尔科夫模型的网络安全风险实时分析方法[J].计算机科学,2016,3(S2):338-341. [7] CHEN H,WANG F,XIAO Z J,et al(1)Network security situation assessment model fusing multi-source data[J].Computer Engineering and Applications,2015,1(17):96-101.(in Chinese) 陈虹,王飞,肖振久,等.一种融合多源数据的网络安全态势评估模型[J].计算机工程与应用,2015,1(17):96-101. [8] MA C G,WANG C H,ZHANG D H,et al(1)A Dynamic Network Risk Assessment Model Based on Attacker’s Inclination[J].Journal of Computer Research and Development,2015,2(9):2056-2068.(in Chinese) 马春光,汪诚弘,张东红,等.一种基于攻击意愿分析的网络风险动态评估模型[J].计算机研究与发展,2015,2(9):2056-2068. [9] LI F W,ZHANG X Y,ZHU J,et al(1)Network security situatio-nal awareness model based on information fusion[J].Journal of Computer Applications,2015,5(7):1882-1887.(in Chinese) 李方伟,张新跃,朱江,等.基于信息融合的网络安全态势评估模型[J].计算机应用,2015,5(7):1882-1887. [10] WANG K,QIU H,YANG H P.Network security situationevaluation method based on attack pattern recognition[J].Journal of Computer Applications,2016,6(1):194-198.(in Chinese) 王坤,邱辉,杨豪璞.基于攻击模式识别的网络安全态势评估方法[J].计算机应用,2016,6(1):194-198. [11] HUANG Z H,WU L L,ZHANG B.Network Security Threatsand Prevention on Cloud Computing[J].Journal of Chongqing University of Technology(Natural Science),2012,6(8):85-90.(in Chinese) 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学),2012,26(8):85-90. |
No related articles found! |
|