Netinfo Security ›› 2020, Vol. 20 ›› Issue (9): 22-26.doi: 10.3969/j.issn.1671-1122.2020.09.005
Previous Articles Next Articles
ZHANG Runzi1,2, LIU Wenmao1(), YOU Yang1, XIE Feng3
Received:
2020-07-16
Online:
2020-09-10
Published:
2020-10-15
Contact:
Wenmao LIU
E-mail:liuwenmao@nsfocus.com
CLC Number:
ZHANG Runzi, LIU Wenmao, YOU Yang, XIE Feng. Research on AISecOps Automation Levels and Technology Trends[J]. Netinfo Security, 2020, 20(9): 22-26.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2020.09.005
[1] | PEI K, GU Z, SALTAFORMAGGIO B, et al. Hercule: Attack Story Reconstruction via Community Discovery on Correlated Log Graph[C]// ACSA. The 32nd Annual Conference on Computer Security Applications, December 5-9, 2016, Los Angeles, California, USA. New York: ACM, 2016: 583-595. |
[2] | MILAJERDI S M, GJOMEMO R, ESJETE B, et al. Holmes: Real-time APT Detection through Correlation of Suspicious Information Flows[C]// IEEE. 2019 IEEE Symposium on Security and Privacy(S&P), May 19-23, 2019, San Francisco, CA, USA. New York: IEEE, 2019: 1137-1152. |
[3] | LIU Junxu, MENG Xiaofeng. Survey on Privacy-preserving Machine Learning[J]. Journal of Computer Research and Development, 2020,57(2):346-362. |
刘俊旭, 孟小峰. 机器学习的隐私保护研究综述[J]. 计算机研究与发展, 2020,57(2):346-362. | |
[4] | HASSAN W U, GUO S, LI D, et al. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage[C]// Internet Society. Network and Distributed System Security Symposium(NDSS) 2019, February 24-27, 2019, San Diego, CA, USA. Reston, VA: Internet Society, 2019. |
[5] |
BRYANT D J. Rethinking OODA: Toward a Modern Cognitive Framework of Command Decision Making[J]. Military Psychology, 2006,18(3):183-206.
doi: 10.1207/s15327876mp1803_1 URL |
[6] | WIKIPEDIA, https://en.wikipedia.org/wiki/Self-driving_car, 2020-6-21. |
[7] | GILPIN L H, BAU D, YUAN B Z, et al. Explaining Explanations: An Overview of Interpretability of Machine Learning[C]// IEEE. 2018 IEEE 5th International Conference on Data Science and Advanced Analytics(DSAA), October 1-4, 2018, Turin, Italy. New York: IEEE, 2018: 80-89. |
[1] | LU Jiali. Log Anomaly Detection Method Based on Improved Time Series Model [J]. Netinfo Security, 2020, 20(9): 1-5. |
[2] | SHEN Jinwei, ZHAO Yi, LIANG Chunlin, ZHANG Ping. RFID Group Tag Ownership Transfer Protocol Based on Cyclic Grouping Function [J]. Netinfo Security, 2020, 20(9): 102-106. |
[3] | ZHOU Zhining, WANG Binjun, ZHAI Yiming, TONG Xin. Spam Filtering Model Based on ALBERT Dynamic Word Vector [J]. Netinfo Security, 2020, 20(9): 107-111. |
[4] | HAN Lei, CHEN Wuping, ZENG Zhiqiang, ZENG Yingming. Research on Hierarchical Network Structure and Application of Blockchain [J]. Netinfo Security, 2020, 20(9): 112-116. |
[5] | LI Qiao, LONG Chun, WEI Jinxia, ZHAO Jing. A Hybrid Model of Intrusion Detection Based on LMDR and CNN [J]. Netinfo Security, 2020, 20(9): 117-121. |
[6] | TONG Xin, WANG Luona, WANG Runzheng, WANG Jingya. A Generation Method of Word-level Adversarial Samples for Chinese Text Classification [J]. Netinfo Security, 2020, 20(9): 12-16. |
[7] | HUANG Na, HE Jingsha, WU Yabiao, LI Jianguo. Method of Insider Threat Detection Based on LSTM Regression Model [J]. Netinfo Security, 2020, 20(9): 17-21. |
[8] | WU Zenan, TIAN Liqin, CHEN Nan. Research on Quantitative Analysis of System Security Based on Stochastic Petri Net [J]. Netinfo Security, 2020, 20(9): 27-31. |
[9] | XU Yu, ZHOU You, LIN Lu, ZHANG Cong. Applied Research of Unsupervised Machine Learning in Game Anti-fraud [J]. Netinfo Security, 2020, 20(9): 32-36. |
[10] | XU Huikai, LIU Yue, MA Zhenbang, DUAN Haixin. A Large-scale Measurement Study of MQTT Security [J]. Netinfo Security, 2020, 20(9): 37-41. |
[11] | LIU Daheng, LI Hongling. Research on QR Code Phishing Detection [J]. Netinfo Security, 2020, 20(9): 42-46. |
[12] | WANG Jinmiao, XIE Yongheng, WANG Guowei, LI Yiting. A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-based Encryption [J]. Netinfo Security, 2020, 20(9): 47-51. |
[13] | ZENG Yingming, WANG Bin, GUO Min. Research on Collaborative Defense Technology of Network Security Based on Swarm Intelligence [J]. Netinfo Security, 2020, 20(9): 52-56. |
[14] | LI Shibin, LI Jing, TANG Gang, LI Yi. Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM [J]. Netinfo Security, 2020, 20(9): 57-61. |
[15] | WU Jing, LU Tianliang, DU Yanhui. Generation of Malicious Domain Training Data Based on Improved Char-RNN Model [J]. Netinfo Security, 2020, 20(9): 6-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||