Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 428-432.
• Information Security • Previous Articles Next Articles
ZHAN Xiong1,2, GUO Hao1,2, HE Xiao-yun1,2, LIU Zhou-bin3, SUN Xue-jie4, CHEN Hong-song4
CLC Number:
[1]吕华章,陈丹,范斌,等.边缘计算标准化进展与案例分析[J].计算机研究与发展,2018,55(3):487-511. [2]GB/T 22239:信息安全技术 网络安全等级保护基本要求 第1部分:通用要求[S].中国国家标准化管理委员会.北京:中国标准出版社. [3]GB/T 22239:信息安全技术 网络安全等级保护基本要求 第4部分:物联网安全扩展要求[S].中国国家标准化管理委员会.北京:中国标准出版社. [4]GB/T 28448:信息安全技术 网络安全等级保护评测要求 第1部分:安全通用要求[S].中国国家标准化管理委员会,北京:中国标准出版社. [5]GB/T 28448:信息安全技术 网络安全等级保护评测要求 第4部分:物联网安全扩展要求[S].中国国家标准化管理委员会.北京:中国标准出版社. [6]GB/T 28449:信息安全技术网络安全等级保护测评过程指南[S].中国国家标准化管理委员会.北京:中国标准出版社. [7]杨小彬,李和明,尹忠东,等.基于层次分析法的配电网能效指标体系[J].电力系统自动化,2013,37(21):146-150. [8]LANGER L,SKOPIK F,SMITH P,et al.From old to new:assessing cybersecurity risks for an evolving smart grid[J].Computers & Security,2016,62:165-176. [9]苑嘉航,李存斌.基于灰关联和D-S证据理论电网企业信息安全风险评估[J].陕西电力,2014,42(2):11-15. [10]徐洋,谢晓尧.信息安全等级保护测评量化模型[M].武汉:武汉大学出版社,2017. [11]WILLIAMS I,YUAN X.Evaluating the effectiveness of Microsoft threat modeling tool[C]∥Information Security Curriculum Development Conference.ACM,2015:76-83. [12]张佳乐,赵彦超,陈兵,等.边缘计算数据安全与隐私保护研究综述[J].通信学报,2018,39(3):1-21. [13]陈红松,王钢,宋建林.基于云计算入侵检测数据集的内网用户异常行为分类算法研究[J].信息网络安全,2018,18(3):1-7. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | XIAO Ding, ZHANG Yu-fan, JI Hou-ye. Electricity Theft Detection Based on Multi-head Attention Mechanism [J]. Computer Science, 2022, 49(1): 140-145. |
[3] | YONG Qi, JIANG Wei-na, LUO Yu-ze. Trial Risk Assessment System Based on Fuzzy Number Similarity [J]. Computer Science, 2021, 48(5): 209-216. |
[4] | WANG Xiao-xiao, WANG Ting-wen, MA Yu-ling, FAN Jia-yi, CUI Chao-ran. Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest [J]. Computer Science, 2021, 48(11A): 429-434. |
[5] | XIAO Yong, JIN Xin, FENG Jun-hao. Cross-layer Matching Mechanism of Link Communication Rate for Heterogeneous Communication in Power System [J]. Computer Science, 2021, 48(11A): 495-499. |
[6] | LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575. |
[7] | GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591. |
[8] | XIAO Yong, JIN Xin, WANG Li-bo and LUO Hong-xuan. Research on Intelligent Multi-mode Gonverged Gateway Device Based on AMI [J]. Computer Science, 2020, 47(6A): 289-293. |
[9] | WANG Yi-rou,ZHANG Da-min,XU Hang,SONG Ting-ting,FAN Ying. Spectrum Allocation Strategy for Neighborhood Network Based Cognitive Smart Grid [J]. Computer Science, 2020, 47(3): 267-272. |
[10] | LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41. |
[11] | YAN Gong-da, DONG Peng, WEN Hao-lin. Simulation Modeling of Complex Engineering Project Schedule Risk AssessmentBased on Multi Agent [J]. Computer Science, 2019, 46(6A): 523-526. |
[12] | SUN Lian-shan, OUYANG Xiao-tong, XU Yan-yan, WANG Yi-xing. Novel Sanitization Approach for Indirect Dependencies in Provenance Graph [J]. Computer Science, 2019, 46(3): 164-169. |
[13] | YE Zi-wei, GUO Yuan-bo, LI Tao, JU An-kang. Extended Attack Graph Generation Method Based on Knowledge Graph [J]. Computer Science, 2019, 46(12): 165-173. |
[14] | WANG Hui, ZHOU Ming-ming. Medical Information Security Storage Model Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 174-179. |
[15] | YANG De-jie, ZHANG Ning, YUAN Ji, BAI Lu. Individual Credit Risk Assessment Based on Stacked Denoising Autoencoder Networks [J]. Computer Science, 2019, 46(10): 7-13. |
|