Computer Science ›› 2024, Vol. 51 ›› Issue (11): 321-328.doi: 10.11896/jsjkx.231000127
• Information Security • Previous Articles Next Articles
WU Yue1, HU Wei2, LI Chenglong1, YANG Jiahai1, LI Zhiqi3, YIN Qin3, XIA Ang2, DANG Fangfang4
CLC Number:
[1] FENG D G,LIAN Y F.Challenges and Countermeasures to Cyberspace Security[J].Proceedings of the Chinese Academy of Sciences,2021,36(10):1239-1245. [2] MORGAN S.2022 Official Cybercrime Report[EB/OL].(2022-10-17)[2023-09-01].https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/resourcefiles/2022-Official-Cybercrime-Report.pdf. [3] MIAO C,WANG J,ZHUANG S,et al.A Coordinated View of Cyberspace[J].arXiv:1910.09787,2019. [4] FANG B X.Coverage Areas of Cyberspace Security Technologies From a Hierarchical Perspective[J].Journal of Network and Information Security,2015,1(1):2-7. [5] GUO L,CAO Y N,SU M J,et al.Cyberspace Resource Mapping:Concepts and Techniques[J].Journal of Information Security,2018,3(4):1-14. [6] GUO Q Q,GAO C D,SUN K F,et al.Construction of a Hierarchical System of Cyberspace Elements based on the “People-Place-Network” relationship[J].Geographical Studies,2021,40(1):109-118. [7] ZHANG L,ZHOU Y,SHI Q S,et al.Cyberspace Map Model with Tight Geospatial Correlation[J].Journal of Information Security,2018,3(4):63-72. [8] CHEN S,GUO Q Q,GAO C D,et al.Concepts and Methods of Cyberspace Geographic Mapping[J].Science & Technology Review,2023,41(13):14-22. [9] DONG C,JIANG B,LU Z G,et al.A Review of Knowledge Graphs for Cyberspace Security Intelligence[J].Journal of Information Security,2020,5(5):56-76. [10] BATTY M.The geography of cyberspace[J].Environment andPlanning B:Planning and Design,1993,20(6):615-616. [11] WANG H F,DING J,HU F H,et al.An Overview of Large-Scale Enterprise-Class Knowledge Graph Practices[J].Compu-ter Engineering,2020,46(7):1-13. [12] SINGHAL A.Introducing the knowledge graph:Things,notstrings.official blog[EB/OL].(2012-05-16)[2023-09-01].https://blog.google/products/search/introducing-knowledge-gra-ph-things-not/. [13] CICALESE D,AUGE J,JOUMBLATT D,et al.Characterizing IPv4 Anycast Adoption and Deployment[C]//Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies.2015:1-13. [14] YANG J H,HE L,LI C L.Cyberspace Mapping-Principles,Techniques and Applications[M]//Posts and Telecom Press,2023. [15] COX K C,EICK S G,HE T.3D Geographic Network Displays[J].ACM SIGMOD Record,1996,25(4):50-54. [16] NSA/CSS Threat Operations Center.Bad Guys Are Every-where,Good Guys Are Somewhere[EB/OL].(2014-09-14)[2023-09-01].https://nsarchive.gwu.edu/sites/default/files/documents/3469146/Document-01-NSA-CSS-Threat-Operations-Center.pdf. [17] HE J B,LI X T.Awareness and Reflection on Geographic Information Classification and Coding[J].Geography and Geographic Information Science,2002,18(3):1-7. [18] Cyberspace of the Central Cyberspace Affairs Commission.Na-tional cybersecurity incident response plan[EB/OL].(2017-06-27)[2023-09-01].http://www.cac.gov.cn/2017-06/27/c_1121220113.htm. [19] Neo4j.Neo4j Graph Database[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/. [20] Neo4j.Cypher Manual[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/docs/cypher-manual/current/. [21] GRUBER T R.A Translation Approach to Portable OntologySpecifications[J].Knowledge Acquisition,1993,5(2):199-220. [22] BIZER C.The D2RQ Platform[EB/OL].(2010-03-04)[2023-09-01].http://d2rq.org/. [23] The D2RQ Mapping Language[EB/OL].(2012-06-22)[2023-09-01].http://d2rq.org/d2rq-language. [24] CENSYS.The Censys Internet Map[EB/OL].(2023-09-01)[2023-09-01].https://about.censys.io/. [25] CAIDA.Caida[EB/OL].2023.https://www.caida.org./. [26] ZoomEye.Zoomeye[EB/OL].https://www.zoomeye.org/. [27] BEN-ARTZI A,CHANDNA A,WARRIER U.Network ma-nagement of tcp/ip networks:present and future[J].IEEE Network,1990,4(4):35-43. |
[1] | NIU Guanglin, LIN Zhen. Survey of Knowledge Graph Representation Learning for Relation Feature Modeling [J]. Computer Science, 2024, 51(9): 182-195. |
[2] | CHEN Shanshan, YAO Subin. Study on Recommendation Algorithms Based on Knowledge Graph and Neighbor PerceptionAttention Mechanism [J]. Computer Science, 2024, 51(8): 313-323. |
[3] | ZHANG Hui, ZHANG Xiaoxiong, DING Kun, LIU Shanshan. Device Fault Inference and Prediction Method Based on Dynamic Graph Representation [J]. Computer Science, 2024, 51(7): 310-318. |
[4] | PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5. |
[5] | HE Jing, ZHAO Rui, ZHANG Hengshuo. Visual Bibliometric Analysis of Knowledge Graph [J]. Computer Science, 2024, 51(6A): 230500123-10. |
[6] | TANG Xin, SUN Yufei, WANG Yujue, SHI Min, ZHU Dengming. Three Layer Knowledge Graph Architecture for Industrial Digital Twins [J]. Computer Science, 2024, 51(6A): 230400153-6. |
[7] | ZHU Yuliang, LIU Juntao, RAO Ziyun, ZHANG Yi, CAO Wanhua. Knowledge Reasoning Model Combining HousE with Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600209-8. |
[8] | SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243. |
[9] | ZHOU Honglin, SONG Huazhu, ZHANG Juan. Knowledge Graph Embedding Model with Entity Description on Cement Manufacturing Domain [J]. Computer Science, 2024, 51(3): 251-256. |
[10] | ZOU Chunling, ZHU Zhengzhou. Fusion Model of Housekeeping Service Course Recommendation Based on Knowledge Graph [J]. Computer Science, 2024, 51(2): 47-54. |
[11] | XU Tianyue, LIU Xianhui, ZHAO Weidong. Knowledge Graph and User Interest Based Recommendation Algorithm [J]. Computer Science, 2024, 51(2): 55-62. |
[12] | HAN Yijian, WANG Baohui. Study on DistMult Decoder in Knowledge Graph Entity Relationship Prediction [J]. Computer Science, 2024, 51(11A): 231200118-5. |
[13] | WANG Yuhan, MA Fuyuan, WANG Ying. Construction of Fine-grained Medical Knowledge Graph Based on Deep Learning [J]. Computer Science, 2024, 51(11A): 230900157-7. |
[14] | GU Zhaojun, YANG Wen, SUI He, LI Zhiping. Threat Assessment of Air Traffic Control Information System Based on Knowledge Graph [J]. Computer Science, 2024, 51(11A): 240200052-11. |
[15] | ZHAO Weidong, JIN Yanfeng, ZHANG Rui, LIN Yanzheng. KBQA Algorithm Introducing Core Entity Attention Evaluation [J]. Computer Science, 2024, 51(11): 239-247. |
|