Accesso libero

The Technical Research on the Assessment of Network Security Situation Based on D-S Evidence Theory

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Gong Jian, Zang Xiaodong, Su Qi etc. Survey of Network Security Situation Awareness [J]. Journal of Software, 2017, 28(4):1010-1026. Search in Google Scholar

Leau Y B, Manickam S, Chong Y W. Network Security Situation Assessment: A Review and Discussion[M]// Information Science and Applications. Springer Berlin Heidelberg, 2015:407-414. Search in Google Scholar

Fang Yan, Yin Xiaochuan, Li Jingzhi. Research of quantitative network security assessment based on Bayesian-attack graphs [J]. Application Research of Computers, 2013, 30(9): 2763-2766 Search in Google Scholar

Chen Hong, Wang Fei etc. Network security situation assessment model fusing multi-source data [J]. Computer Engineering and Applications,2015,51(17):96-101. Search in Google Scholar

Yong Zhang. Research and system implementation of network security situation awareness model [D]. University of Science and Technology of China, 2010. Search in Google Scholar

Wang C, Zhang Y. Network Security Situation Evaluation Based on Modified D-S Evidence Theory[J]. Wuhan University Journal of Natural Sciences, 2014, 19(5):409-416. Search in Google Scholar

WANG YongweiLIU YunanZHAO RongcaiSI Cheng etc. Situation assessment method based on improved evidence theory [J]. Journal of Computer Applications, 2014, 34(2): 491-495. Search in Google Scholar

Tang YongliLi WeijieYu Jinxia etc. Network security situational assessment method based on improved D-S evidence theory [J]. Journal of Nanjing University of Science and Technology, 2015, 34(4):405-411. Search in Google Scholar

Greene A M, Holsclaw T, Robertson A W, et al. A Bayesian Multivariate Nonhomogeneous Markov Model[M]//Machine Learning and Data Mining Approaches to Climate Science. Springer International Publishing, 2015: 61-69. Search in Google Scholar

Tu S. Derivation of baum-welch algorithm for hidden markov models[J]. 2015. Search in Google Scholar

WANG Yuhui,ZENG Zehua,SHEN JiahuiFU etc. APT Logic-based Causality Analysis of Terrorist Incidents [J]. Netinfo Security, 2017(9). Search in Google Scholar

Cao lili. On-line fault diagnosis and multi-step fault prediction for TE Process based on HMM [D]. HuazhongUniversityofScienceandTechnology, 2015. Search in Google Scholar

Hong-sheng xi. Introduction to stochastic processes [M]. University of Science and Technology of China Press, 2009. Search in Google Scholar

Cheng X, Lang S. Research on network security situation assessment and prediction[C]//Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on. IEEE, 2012: 864-867. Search in Google Scholar

Sarma A D, Molla A R, Pandurangan G, et al. Fast distributed pagerank computation[J]. Theoretical Computer Science, 2015, 561: 113-121. Search in Google Scholar

Wei Yong, Lian Yifeng, Feng Dengguo. A Network Security Situational Awareness Model Based on Information Fusion [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2009, 46(3):353-362. Search in Google Scholar

eISSN:
2444-8656
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics