[1] 赖积保,王颖,王慧强,等. 基于多源异构传感器的网络安全态势感知系统结构研究[J]. 计算机科学,2011,38(3):45-50. LAI Ji-bao, WANG Ying, WANG Hui-qiang, et al . Research on network security situation awareness system architecture based on multi-source heterogeneous sensors [J]. Computer Science, 2011, 38(3): 45-50. [2] 陈秀真,郑庆华,管晓宏. 层次化网络安全威胁态势量化评估方法[J]. 软件学报,2006,17(4):885-897. CHEN Xiu-zhen, ZHENG Qing-hua, GUAN Xiao-hong. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885-897. [3] 朱丽娜,张作昌,冯力. 层次化网络安全威胁态势评估技术研究[J]. 计算机应用研究,2011,28(11):89-93. ZHU Li-na, ZHANG Zuo-chang, FENG Li. Research on hierarchical network security threat situation assessment [J]. Application Research of Computers, 2011, 28(11): 89-93. [4] 赵鹏宇,刘丰,张宏莉,等. 大规模网络安全态势评估系统[J]. 计算机工程与应用,2008,44(33):122-127. ZHAO Peng-yu, LIU Feng, ZHANG Hong-li, et al . Security situation evaluation system for large scale network[J]. Computer Engineering and Applications, 2008, 44(33): 122-127. [5] 张翔,胡昌振,刘胜航,等. 基于支持向量机的网络攻击态势预测技术研究[J]. 计算机工程,2007,33(11):10-12. ZHANG Xiang, HU Chang-zhen, LIU Sheng-hang, et al . Research on network attack situation forecast technique based on support vector machine [J]. Computer Engineering, 2007, 33(11): 10-12. [6] 王娟,张凤荔,傅翀,等. 网络态势感知中的指标体系研究[J].计算机应用,2007,27(8):1907-1911. WANG Juan, ZHANG Feng-li, FU Chong, et al . Study on index system in network situation awareness[J]. Journal of Computer Application, 2007, 27(8): 1907-1911. [7] 宋舜宏,陆余良,夏阳. 基于贪心策略的网络攻击图生成方法[J]. 计算机工程,2011,37(2):78-82. SONG Shun-hong, LU Yu-liang, XIA Yang. Method of network attack graph generation based on greedy policy[J]. Computer Engineering, 2011, 37(2): 78-82. [8] 徐南南,连一峰,韦勇. 一种基于图聚类的安全态势评估方法[J]. 计算机工程,2009,35(1):140-143. XU Nan-nan, LIAN Yi-feng, WEI Yong. Method of security situation assessment based on graph clustering[J]. Computer Engineering, 2009, 35(1): 140-143. [9] 陈天平,乔向东,郑连清,等. 图论在网络安全威胁态势分析中的应用[J]. 北京邮电大学学报,2009,32(1):113-117. CHEN Tian-ping, QIAO Xiang-dong, ZHENG Lian-qing, et al . Application of graph theory in threat situation analysis of network security[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(1): 113-117. [10] 曹建亮,姜君娜,王宏. 基于贝叶斯网络的网络安全态势评估方法研究[J]. 计算机与信息技术,2007,30(22):410-411. CAO Jian-liang, JIANG Jun-na, WANG Hong. Network security situation assessment method research based on bayesian net [J]. Computer & Information Technology, 2007, 30(22): 410-411. [11] 柴慧敏,王宝树. 态势评估中的贝叶斯网络模型研究[J]. 西安电子科技大学学报,2009,36(3):491-495. CHAI Hui-min, WANG Bao-shu. Research on the bayesian networks model in situation assessment[J]. Journal of Xidian University, 2009, 36(3): 491-495. [12] CHANG K C, YEH M F. Grey reational analysis based approach for data clustering [J]. IEE Proceedings, Vision, Image and Signal Processing, 2005, 152(2): 165-172. [13] GB/T 20984—2007 信息安全技术信息安全风险评估规范[S]. [14] 沈祥,朱传柏. 基于多智能体的电力信息融合模型设计[J]. 中国电力,2010,43(12):64-69. SHEN Xiang, ZHU Chuan-bai. Design of power information fusion model based on multi-Agent system[J]. Electric Power, 2010, 43(12): 64-69. |