[1] |
王意洁, 程力, 马行空 . 运用警报关联的威胁行为检测技术综述[J]. 国防科技大学学报, 2017,8(5):128-138.
|
|
WANG Yijie, CHENG Li, MA Xingkong . Survey of Alert-correlation Based on Network Threat Detection Techniques[J]. Journal of National University of Defense Technology, 2017,8(5):128-138.
|
[2] |
李龙营, 李金库, 马建峰 , 等. 采用攻击策略图的实时警报综合分析方法[J]. 西安电子科技大学学报, 2014,41(5):84-90.
doi: 10.3969/j.issn.1001-2400.2014.05.015
|
|
LI Longying, LI Jinku, MA Jianfeng , et al. Comprehensive Analysis of Real-time Alerts with Attack Strategy Graphs[J]. Journal of Xidian University, 2014,41(5):84-90.
doi: 10.3969/j.issn.1001-2400.2014.05.015
|
[3] |
WANG C H, YANG J M. Adaptive Feature-weighted Alert Correlation System Applicable in Cloud Environment [C]//Proceedings of the 2013 8th Asia Joint Conference on Information Security. Washington: IEEE Computer Society, 2013: 41-47.
|
[4] |
RAMAKI A A, AMINI M, EBRAHIMI ATANI R . RTECA: Real Time Episode Correlation Algorithm for Multi-step Attack Scenarios Detection[J]. Computers and Security, 2015,49:206-219.
|
[5] |
WANG Y, LI G C, XU Y K , et al. An Algorithm for Mining of Association Rules for the Information Communication Network Alarms Based on Swarm Intelligence[J]. Mathematical Problems in Engineering, 2014,2014:894205.
|
[6] |
WANG Y, XU Y, LI G , et al. Association Rules Mining Algorithm Using Sharing Mechanism Niche Leaping Ant Colony Based on Apriori Algorithm[J]. Journal of Computational and Theoretical Nanoscience, 2015,12(10):3223-3231.
|
[7] |
LI C, HUANG X. Research on FP-growth Algorithm for Massive Telecommunication Network Alarm Data Based on Spark [C]//Proceedings of the 2017 IEEE International Conference on Software Engineering and Service Science. Washington: IEEE Computer Society, 2017: 875-879.
|
[8] |
AGRAWAL R, SRIKANT R. Mining Sequential Patterns [C]//Proceedings of the 1995 International Conference on Data Engineering. Piscataway: IEEE, 1995: 3-14.
|
[9] |
WANG J, LI H, HUANG J , et al. Association Rules Mining Based Analysis of Consequential Alarm Sequences in Chemical Processes[J]. Journal of Loss Prevention in the Process Industries, 2016,41:178-185.
|
[10] |
LIM H K, KIM Y, KIM M K . Failure Prediction Using Sequential Pattern Mining in the Wire Bonding Process[J]. IEEE Transactions on Semiconductor Manufacturing, 2017,30(3):285-292.
|
[11] |
WANG J, HE C, LIU Y , et al. Efficient Alarm Behavior Analytics for Telecom Networks[J]. Information Sciences, 2017,402:1-14.
|
[12] |
MIHAELA L, MARTHA V K, VINCENT H. Relation Discovery of Mobile Network Alarms with Sequential Pattern Mining [C]//Proceedings of the 2017 International Conference on Computing, Networking and Communications. Piscataway: IEEE, 2017: 363-367.
|
[13] |
罗明, 孟传伟, 黄海量 . 基于加权频繁模式树的通信网络告警规则挖掘方法[J]. 计算机工程, 2016,42(4):190-196.
doi: 10.3969/j.issn.1000-3428.2016.04.034
|
|
LUO Ming, MENG Chuanwei, HUANG Hailiang . Alarm Rule Mining Method in Telecommunication Network Based on Weighted Frequent Pattern-tree[J]. Computer Engineering, 2016,42(4):190-196.
doi: 10.3969/j.issn.1000-3428.2016.04.034
|
[14] |
MURUGEST T, AIYER C A . Analysis and Optimization of Alarm[J]. Journal of System and Management Sciences, 2013,3(4):1-17.
|
[15] |
汪星, 黄小瑜, 刘瑄璞 , 等. 面向工业大数据的多层增量特征提取方法[J]. 西安电子科技大学学报, 2018,45(4):112-117.
|
|
WANG Xing, HUANG Xiaoyu, LIU Xuanpu , et al. Multi-layer Incremental Feature Extraction Method for Industrial Big Data[J]. Journal of Xidian University, 2018,45(4):112-117.
|
[16] |
PEI J, HAN J, MORTAZAVI-ASL B , et al. Mining Sequential Patterns by Pattern-Growth: The Prefix Span Approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(11):1424-1440.
|
[17] |
GOETHALS B . Frequent Itemset Mining Implementations Repository[EB/OL]. [ 2019- 2- 20]. http://fimi.cs.helsinki.fi/.
|