This work is licensed under the Creative Commons Attribution 4.0 International License.
Gong Jian, Zang Xiaodong, Su Qi etc. Survey of Network Security Situation Awareness [J]. Journal of Software, 2017, 28(4):1010-1026.Search in Google Scholar
Leau Y B, Manickam S, Chong Y W. Network Security Situation Assessment: A Review and Discussion[M]// Information Science and Applications. Springer Berlin Heidelberg, 2015:407-414.Search in Google Scholar
Fang Yan, Yin Xiaochuan, Li Jingzhi. Research of quantitative network security assessment based on Bayesian-attack graphs [J]. Application Research of Computers, 2013, 30(9): 2763-2766Search in Google Scholar
Chen Hong, Wang Fei etc. Network security situation assessment model fusing multi-source data [J]. Computer Engineering and Applications,2015,51(17):96-101.Search in Google Scholar
Yong Zhang. Research and system implementation of network security situation awareness model [D]. University of Science and Technology of China, 2010.Search in Google Scholar
Wang C, Zhang Y. Network Security Situation Evaluation Based on Modified D-S Evidence Theory[J]. Wuhan University Journal of Natural Sciences, 2014, 19(5):409-416.Search in Google Scholar
WANG YongweiLIU YunanZHAO RongcaiSI Cheng etc. Situation assessment method based on improved evidence theory [J]. Journal of Computer Applications, 2014, 34(2): 491-495.Search in Google Scholar
Tang YongliLi WeijieYu Jinxia etc. Network security situational assessment method based on improved D-S evidence theory [J]. Journal of Nanjing University of Science and Technology, 2015, 34(4):405-411.Search in Google Scholar
Greene A M, Holsclaw T, Robertson A W, et al. A Bayesian Multivariate Nonhomogeneous Markov Model[M]//Machine Learning and Data Mining Approaches to Climate Science. Springer International Publishing, 2015: 61-69.Search in Google Scholar
Tu S. Derivation of baum-welch algorithm for hidden markov models[J]. 2015.Search in Google Scholar
WANG Yuhui,ZENG Zehua,SHEN JiahuiFU etc. APT Logic-based Causality Analysis of Terrorist Incidents [J]. Netinfo Security, 2017(9).Search in Google Scholar
Cao lili. On-line fault diagnosis and multi-step fault prediction for TE Process based on HMM [D]. HuazhongUniversityofScienceandTechnology, 2015.Search in Google Scholar
Hong-sheng xi. Introduction to stochastic processes [M]. University of Science and Technology of China Press, 2009.Search in Google Scholar
Cheng X, Lang S. Research on network security situation assessment and prediction[C]//Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on. IEEE, 2012: 864-867.Search in Google Scholar
Sarma A D, Molla A R, Pandurangan G, et al. Fast distributed pagerank computation[J]. Theoretical Computer Science, 2015, 561: 113-121.Search in Google Scholar
Wei Yong, Lian Yifeng, Feng Dengguo. A Network Security Situational Awareness Model Based on Information Fusion [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2009, 46(3):353-362.Search in Google Scholar