Journal of Shanghai Jiaotong University ›› 2015, Vol. 49 ›› Issue (08): 1144-1152.
• Automation Technique, Computer Technology • Previous Articles Next Articles
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1
Received:
2014-09-15
Online:
2015-08-31
Published:
2015-08-31
CLC Number:
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1. Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion[J]. Journal of Shanghai Jiaotong University, 2015, 49(08): 1144-1152.
[1]Bass T. Multisensor data fusion for next generation distributed intrusion detection systems[C]∥Proceedings of the'99 IRIS National Symposium. on Sensor and Data Fusion. Laurel:IEEE, 1999:2427. [2]GONG ZhengHu, ZHUO Ying. Research on cyberspace situational awareness[J]. Journal of Software,2010, 21(7):16051619.[3]Jeffrey M, Bradshaw, Marco Carvalho, et al. Sol: An agentbased framework for cyber situation awareness[J]. Künstl Intell, Springer, 2012(26):127140.[4]张海霞,苏璞睿,冯登国. 基于攻击能力增长的网络安全分析模型[J]. 计算机研究与发展, 2007,44(12):20122019.ZHANG Haixia, SU Purui, FENG Dengguo. Network security analysis model based on t he increase in attack ability[J]. Journal of Computer Research andDevelopment,2007,44(12):20122019.[5]韦勇,连一峰,冯登国. 基于信息融合的网络安全态势感知模型[J]. 计算机研究与发展,2009,46(3):353362.WEI Yong, LIAN Yifeng, FENG Dengguo. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009,46(3):353362.[6]刘效武,王慧强,赖积保, 等. 基于多源异质融合的网络安全态势生成与评价[J]. 系统仿真学报,2010,22(6):14111415.LIU Xiaowu, WANG Huiqiang, LAI Jibao, et al. Network necurity situation generation and evaluation based on heterogeneous multisensor fusion[J]. Journal of System Simulation, 2010,22(6):14111415.[7]张勇, 谭小彬, 崔孝林, 等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011,22(3):495508.ZHANG Yong, TAN Xiaobin, CUI Xiaolin, et al. Network security situation awareness approach based on Markov game model[J]. Journal of Software,2011,22(3):495508.[8]LIU Sunjun, YU Le, YANG Jin. Research on network security situation awareness technology based on AIS[J]. International Journal of Knowledge and Language Processing, 2011,2(2):2334.[9]Thomas R, Christel B, Martin R, et al. Wireless security situation awareness with attack identification decision support[C]∥2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS). Paris:IEEE, 2011:144151.[10]谢丽霞,王亚超,于巾博. 基于神经网络的网络安全态势感知[J]. 清华大学学报:自然科学版,2013,53(12):17501760.XIE Lixia, WANG Yachao, YU Jinbo. Network security situation awareness based on neural networks[J]. Journal Tsinghua University:Science & Technology,2013,53(12):17501760.[11]黄同庆,庄毅. 一种实时网络安全态势预测方法[J]. 小型微型计算机系统, 2014,35(2): 303306.HUANG Tongqing, ZHUANG Yi. An approach to realtime network security situation prediction[J]. Journal of Chinese Computer Systems,2014,35(2):303306. |
[1] | TANG Shengjing, WANG Taiyan, ZHAO Ganglian, GUO Jie, LI Jiali, YIN Hang(. Review of Multi-Sensor Data Fusion for Target Tracking [J]. Air & Space Defense, 2024, 7(4): 18-29. |
[2] | LI Shoupeng, TAO Zhenji, ZHANG Xiaoyu, XU Shihui, JIN Xiaoqin. Distributed Information Filtering-Based Cooperative Localization Method for Cluster Missiles [J]. Air & Space Defense, 2024, 7(2): 36-41. |
[3] | CHEN Yiqin, HUANG Shuping. An Evaluation Method for Link Importance Based on Seismic Resilience of Road Network [J]. Journal of Shanghai Jiao Tong University, 2023, 57(10): 1250-1260. |
[4] | LI Dong (李栋), FAN Yulin (樊钰琳), L v Na (吕娜), CHEN Guodong∗ (陈国栋), WANG Zheng (王正), CHI Wenzheng (迟文政). Safety Protection Method of Rehabilitation Robot Based on fNIRS and RGB-D Information Fusion [J]. J Shanghai Jiaotong Univ Sci, 2022, 27(1): 45-54. |
[5] | MA Guohong (马国红), LI Jian (李健), HE Yinshui (何银水), XIAO Wenbo (肖文波). Weld Geometry Monitoring for Metal Inert Gas Welding Process with Galvanized Steel Plates Using Bayesian Network [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(2): 239-244. |
[6] | CHEN Wu, WANG Hao, ZHANG Guohua, WANG Chengtang, ZHONG Guoqiang. Evaluation of Tunnel Collapse Susceptibility Based on T-S Fuzzy Fault Tree and Bayesian Network [J]. Journal of Shanghai Jiaotong University, 2020, 54(8): 820-830. |
[7] | TONG Pengfei, CHEN Hao, XU Xinpeng, ZHOU Ge. Study on Information Fusion Technology of Multi-missile Multi-target Collaborative Detection [J]. Air & Space Defense, 2020, 3(3): 54-62. |
[8] | LI Dan (李丹), WANG Hongdong (王鸿东), LIANG Xiaofeng *(梁晓锋). Bayesian Network Based Approach for Diagnosis of Modified Sequencing Batch Reactor [J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(4): 417-429. |
[9] | ZHOU Beibei, LIU Jue. Application of Intelligent Technology in Precision Strike System [J]. Air & Space Defense, 2019, 2(3): 77-83. |
[10] | SHUAI Yong1;2 (帅勇), SONG Tailiang3 (宋太亮), WANG Jianping1 (王建平), ZHAN Wenbin4 (詹文斌). Hybrid Reliability Parameter Selection Method Based on Text Mining, Frequent Pattern Growth algorithm and Fuzzy Bayesian Network [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(3): 423-. |
[11] | GAO Xiaoting,YANG Dongsheng. Research on Operation Condition Monitoring Method of Intellectual Apparatus Based on Data Driven [J]. Journal of Shanghai Jiaotong University, 2017, 51(9): 1104-1110. |
[12] | XU Gongguo1* (徐公国), DUAN Xiusheng1 (段修生), LU Hao2 (吕豪). Target Priority Determination Methods by Interval-Valued Intuitionistic Fuzzy Sets with Unknown Attribute Weights [J]. Journal of shanghai Jiaotong University (Science), 2017, 22(5): 624-632. |
[13] | GONG Pengwei1,FEI Yanqiong1, 3, SONG Libo2. Road Recognition Method of WheelTracked Robot Based on#br# Multisensor Information Fusion [J]. Journal of Shanghai Jiaotong University, 2017, 51(4): 398-. |
[14] | Huang T.; Yan J.; Jiang M.; Peng W.; Huang H.. Reliability analysis of electrical system of computer numerical control machine tool based on bayesian networks [J]. J Shanghai Jiaotong Univ Sci, 2016, 21(5): 635-640. |
[15] | SHANG Qun-li1 (尚群立), ZHANG Zhen2 (张 镇), XU Xiao-bin2* (徐晓滨). Dynamic Fault Diagnosis Using the Improved Linear Evidence Updating Strategy [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(4): 427-436. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||