| [1] |
QIANXIN Threat Intelligence Center. Recoil Network Warfare: Analysis of Ukraine’s Second Power Failure Event[EB/OL]. (2019-09-26) [2024-11-12]. https://www.freebuf.com/articles/system/214591.html.
|
|
奇安信威胁情报中心. 复盘网络战: 乌克兰二次断电事件分析[EB/OL]. (2019-09-26)[2024-11-12]. https://www.freebuf.com/articles/system/214591.html.
|
| [2] |
FENG Zhiwei. Research and Application of Network Security Equipment Linkage Strategy[D]. Baoding: North China Electric Power University, 2014.
|
|
冯志伟. 网络安全设备联动策略的研究与应用[D]. 保定: 华北电力大学, 2014.
|
| [3] |
CHANDOLA V, BANERJEE A, KUMAR V. Anomaly Detection: A Survey[J]. ACM Computing Surveys, 2009, 41(3): 1-58.
|
| [4] |
VIGNESWARAN R, POORNACHANDRAN P, SOMAN K P. A Compendium on Network and Host Based Intrusion Detection Systems[C]// Springer. 1st International Conference on Data Science, Machine Learning and Applications. Heidelberg: Springer, 2020: 23-30.
|
| [5] |
CHAWLA A, LEE B, FALLON S, et al. Host Based Intrusion Detection System with Combined CNN/RNN Model[C]// Springer. Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Heidelberg: Springer, 2019: 149-158.
|
| [6] |
LI Daoquan, YANG Qianqian, LU Xiaofu. SDN Network Intrusion Classification Detection Model Based on Decision Tree[J]. Computer Engineering and Design, 2022, 43(8): 2146-2152.
|
|
李道全, 杨乾乾, 鲁晓夫. 基于决策树的SDN网络入侵分类检测模型[J]. 计算机工程与设计, 2022, 43(8):2146-2152.
|
| [7] |
ZHANG Peiqing, TIAN Guangke, DONG Haiying. Research on Network Intrusion Detection Based on Whitening PCA and CNN[C]// IEEE. 7th International Conference on Smart Grid and Smart Cities. New York: IEEE, 2023: 232-237.
|
| [8] |
ZHUGE Jianwei, TANG Yong, HAN Xinhui, et al. Research and Application Progress of Honeypot Technology[J]. Journal of Software, 2013, 24(4): 825-842.
|
|
诸葛建伟, 唐勇, 韩心慧, 等. 蜜罐技术研究与应用进展[J]. 软件学报, 2013, 24(4):825-842.
|
| [9] |
SHI Leyi, LI Yang, MA Mengfei. Latest Research Progress of Honeypot Technology[J]. Journal of Electronics & Information Technology, 2019, 41(2): 498-508.
|
|
石乐义, 李阳, 马猛飞. 蜜罐技术研究新进展[J]. 电子与信息学报, 2019, 41(2):498-508.
|
| [10] |
KONIARIS I, PAPADIMITRIOU G, NICOPOLITIDIS P. Analysis and Visualization of SSH Attacks Using Honeypots[C]// IEEE. Eurocon 2013. New York: IEEE, 2013: 65-72.
|
| [11] |
WEGERER M, TJOA S. Defeating the Database Adversary Using Deception-A Mysql Database Honeypot[C]// IEEE. 2016 International Conference on Software Security and Assurance. New York: IEEE, 2016: 6-10.
|
| [12] |
FAN Wenjun, FERNÁNDEZ D, VILLAGRÁ V A. Technology Independent Honeynet Description Language[C]// IEEE. 2015 3rd International Conference on Model-Driven Engineering and Software Development. New York: IEEE, 2015: 303-311.
|
| [13] |
FAN Wenjun, DU Zhihui, SMITH-CREASEY M, et al. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design[J]. IEEE Journal on Selected Areas in Communications, 2019, 37(3): 683-697.
doi: 10.1109/JSAC.2019.2894307
|
| [14] |
TIAN Zhihong, FANG Binxing, LIAO Qing, et al. Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: from Self-Defense to Guard[J]. Strategic Study of CAE, 2023, 25(6): 96-105.
doi: 10.15302/J-SSCAE-2023.06.007
|
|
田志宏, 方滨兴, 廖清, 等. 从自卫到护卫:新时期网络安全保障体系构建与发展建议[J]. 中国工程科学, 2023, 25(6):96-105.
doi: 10.15302/J-SSCAE-2023.06.007
|
| [15] |
CAO Yuhao, WANG Xinjian, WANG Yihang, et al. Analysis of Factors Affecting the Severity of Marine Accidents Using a Data-Driven Bayesian Network[EB/OL]. (2023-01-03) [2024-11-12]. https://doi.org/10.1016/j.oceaneng.2022.113563.
|