[1] |
BASS T.Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems[J]. Proceedings of the Iris National Symposium on Sensor & Data Fusion, 2001:24-27.
|
[2] |
LOH P K K,SUBRAMANIAN.D. Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(4):613-624.
|
[3] |
YURCIK W.Visualizing NetFlows for Security at Line Speed: the SIFT Tool Suite[C] // USENIX Association Berkeley. Conference on Systems Administration, December 04 - 09, 2005,San Diego,CA,USA. New York: DBLP, 2005:169-176.
|
[4] |
WANG H, LIANG Y, YE H.An Extraction Method of Situational Factors for Network Security Situational Awareness[C] // IEEE. International Conference on Internet Computing in Science and Engineering, January 28 - 29, 2008, Harbin, China. Washington D.C: IEEE Computer Society ,2008:317-320.
|
|
李冬银. 基于Logistic回归的网络安全态势要素获取研究[D]. 福州:福州大学, 2014.
|
[5] |
刘效武, 王慧强, 吕宏武,等. 网络安全态势认知融合感控模型[J]. 软件学报, 2016, 27(8):2009-2114.
|
[6] |
李宏军, 郎为民,邓刚. 一种高效的大数据中心完整性检查方案研究[J]. 信息网络安全,2016(5):1-8.
|
[7] |
LEE W, STOLFO S J, MOK K W.A Data Mining Framework for Building Intrusion Detection Models[C] // IEEE. Security and Privacy, May 14,1999, Oakland, CA. CA: Security and Privacy, 1999:120-132.
|
[8] |
吴晓平,周舟,李洪成. Spark框架下基于无指导学习环境的网络流量异常检测研究与实现[J]. 信息网络安全,2016(6):1-7.
|
[9] |
徐永华, 李广水. 基于距离加权模板约简和属性信息熵的增量SVM入侵检测算法[J]. 计算机科学, 2012, 39(12):76-78.
|