Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 365-369.
• Information Security • Previous Articles Next Articles
HU Qian
CLC Number:
[1]吴琨,白中英.集对分析的可信网络安全态势评估与预测[J].哈尔滨工业大学学报,2012,44(3):113-118. [2]杨程.基于贝叶斯网络的过程报警事件预测方法[D].北京:北京化工大学,2014. [3]HENDRY G R,YANG S J.Intrusion signature creation via clustering anomalies[C]∥Proceedings of SPIE-The International Society for Optical Engineering.2008:69-730. [4]HOLSOPPLE J,YANG S J.FuSIA:Future Situation and Im-pact Awareness[C]∥2008 11th International Conference on Information Fusion.2008:1-8. [5]张松红,王亚弟,韩继红.基于隐马尔可夫模型的复合攻击预测方法[J].计算机工程,2008,34(6):131-133. [6]FAOUR A,LERAY P,ETER B.A SOM and Bayesian Network Architecture for Alert Filtering in Network Intrusion Detection Systems[C]∥Information and Communication Technologies,2006(ICTTA ’06).2006:3175-3180. [7]高倩.基于贝叶斯网络预测的故障诊断的应用与研究[D].北京:华北电力大学,2011. [8]陈固胜.基于动态贝叶斯网络的战场信息预测与评估[D].南京:南京理工大学,2013. [9]王辉,王云峰,王坤福.基于贝叶斯推理的攻击路径预测研究[J].计算机应用研究,2015,32(1):226-231. [10]张少俊,李建华,宋珊珊,等.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386. [11]贾卓然,李波,张明.基于 MapReduce 的贝叶斯网络参数学习方法[J].计算机测量与控制,2015,23(9):3207-3208. [12]PEI J,HAN J,MORTAZAVI-ASL B,et al.Prefixspan:Mining sequential patterns efficiently by prefix-projected pattern growth[C]∥icccn.IEEE,2001:0215. [13]GUO H,HSU W.A survey of algorithms for real-time Bayesian network inference[C]∥AAAI/KDD/UAI02 Joint Workshop on Real-Time Decision Support and Diagnosis Systems.Edmonton,Canada,2002. |
[1] | WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323. |
[2] | LIU Jing, HUANG Ju, LAI Ying-xu, QIN Hua, ZENG Wei. Study on Secure Log Storage Method Based on Blockchain [J]. Computer Science, 2020, 47(11A): 388-395. |
[3] | WANG Qian,FENG Ya-jun,YANG Zhao-min,YAO Lei. Network Attack Model Based on Ontology and its Application [J]. Computer Science, 2010, 37(6): 114-117. |
[4] | FU Xiao,XIE Li. Security Alert Correlation: A Survey [J]. Computer Science, 2010, 37(5): 9-14. |
[5] | . [J]. Computer Science, 2006, 33(8): 100-105. |
[6] | . [J]. Computer Science, 2005, 32(9): 61-65. |
|