[1] |
张丽敏. 基于云计算技术的网络安全攻防实验平台设计与研究[J]. 电子设计工程, 2018,26(17):62-65.
|
|
Zhang Limin. Design and research of network security attack and defense experiment platform based on cloud computing technology[J]. Electronic Design Engineering, 2018,26(17):62-65.
|
[2] |
龚俭, 臧小东, 苏琪, 等. 网络安全态势感知综述[J]. 软件学报, 2017,28(4):1010-1026.
|
|
Gong Jian, Zang Xiaodong, Su Qi, et al. Survey of network security situation awareness[J]. Journal of Software, 2017,28(4):1010-1026.
|
[3] |
王磊, 孙中伟. 基于安全网络编码的移动网络地理位置隐私保护技术[J]. 南京理工大学学报, 2018,42(1):56-61.
|
|
Wang Lei, Sun Zhongwei. Geography location privacy protection based on secure network coding for mobile networks[J]. Journal of Nanjing University of Science and Technology, 2018,42(1):56-61.
|
[4] |
王坤, 邱辉, 杨豪璞. 基于攻击模式识别的网络安全态势评估方法[J]. 计算机应用, 2016,36(1):194-198.
doi: 10.11772/j.issn.1001-9081.2016.01.0194
|
|
Wang Kun, Qiu Hui, Yang Haopu. Network security situation evaluation method based on attack pattern recognition[J]. Journal of Computer Applications, 2016,36(1):194-198,226.
doi: 10.11772/j.issn.1001-9081.2016.01.0194
|
[5] |
潘恒, 李景峰, 郑秋生. 基于HMM和信息熵的网络安全态势评估方法[J]. 小型微型计算机系统, 2015,36(8):1784-1788.
|
|
Pan Heng, Li Jingfeng, Zheng Qiusheng. Network security situation assessment method based on HMM and information entropy[J]. Journal of Chinese Computer Systems, 2015,36(8):1784-1788.
|
[6] |
崔明辉, 封化民, 刘飚, 等. 一种改进的层次化网络安全态势评估模型仿真[J]. 计算机仿真, 2019,36(11):284-289.
|
|
Cui Minghui, Feng Huamin, Liu Biao, et al. Simulationofan improved hierarchical network security situation evaluation model[J]. Computer Simulation, 2019,36(11):284-289.
|
[7] |
刘浩, 刘建华, 惠馨雅. 基于云模型和马尔科夫链的网络安全态势评估[J]. 计算机与数字工程, 2019,47(6):1432-1436.
|
|
Liu Hao, Liu Jianhua, Hui Xinya. Network security situation assessment based on cloud model and the Markov chain[J]. Computer & Digital Engineering, 2019,47(6):1432-1436.
|
[8] |
曲向华, 史雪梅. 基于层次分析法的网络安全态势评估技术研究[J]. 自动化技术与应用, 2018,37(11):43-45.
|
|
Qu Xianghua, Shi Xuemei. Research of network security situation assessment based on AHP[J]. Techniques of Automation and Applications, 2018,37(11):43-45.
|
[9] |
石乐义, 刘佳, 刘祎豪, 等. 网络安全态势感知研究综述[J]. 计算机工程与应用, 2019,55(24):1-9.
|
|
Shi Leyi, Liu Jia, Liu Yihao, et al. Survey of research on network security situation awareness[J]. Computer Engineering and Applications, 2019,55(24):1-9.
|
[10] |
孙少华, 孙晓东, 李卫. 计算机网络的安全防护设计与实现[J]. 电子设计工程, 2017,25(13):118-121.
|
|
Sun Shaohua, Sun Xiaodong, Li Wei. Design and implementation of computer network security protection[J]. Electronic Design Engineering, 2017,25(13):118-121.
|
[11] |
陈君, 张生. 基于OAuth单点登录系统的安全性分析和评估[J]. 电子科技, 2017,30(9):165-168.
|
|
Chen Jun, Zhang Sheng. Security evaluations and countermeasures of single sign-on systems based on OAuth protocol[J]. Electronic Science and Technology, 2017,30(9):165-168.
|
[12] |
周珑, 郭威, 王建永, 等. 基于神经网络算法的网络安全评价模型[J]. 沈阳工业大学学报, 2018,40(4):426-430.
|
|
Zhou Long, Guo Wei, Wang Jianyong, et al. Network security evaluation model based on neural network algorithm[J]. Journal of Shenyang University of Technology, 2018,40(4):426-430.
|
[13] |
于普漪, 褚智广, 滕征岑, 等. 面向特定网络安全事件响应的态势评估方法[J]. 计算机应用与软件, 2018,35(10):323-333.
|
|
Yu Puyi, Chu Zhiguang, Teng Zhengcen, et al. A situation assessment method for specific network security incident response[J]. Computer Applications and Software, 2018,35(10):323-333.
|