Journal of Shanghai Jiao Tong University ›› 2021, Vol. 55 ›› Issue (S2): 77-81.doi: 10.16183/j.cnki.jsjtu.2021.S2.012
Previous Articles Next Articles
WU Nan1, CHENG Zhetao1, DU Liang2, SHEN Yingping3(
)
Received:2021-08-20
Online:2021-12-28
Published:2022-01-24
Contact:
SHEN Yingping
E-mail:withnet@126.com
CLC Number:
WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory[J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81.
Add to citation manager EndNote|Ris|BibTeX
URL: https://xuebao.sjtu.edu.cn/EN/10.16183/j.cnki.jsjtu.2021.S2.012
| [1] | 周峰, 周晖, 刁赢龙. 泛在电力物联网智能感知关键技术发展思路[J]. 中国电机工程学报, 2020, 40(1): 70-82. |
| ZHOU Feng, ZHOU Hui, DIAO Yinglong. Development of intelligent perception key technology in the ubiquitous Internet of Things in electricity[J]. Proceedings of the CSEE, 2020, 40(1): 70-82. | |
| [2] | 吕志宁, 胡子珩, 宁柏锋, 等. 针对电力系统的物联网需求攻击研究进展与发展趋势[J]. 南方电网技术, 2020, 14(1): 24-30. |
| LÜ Zhining, HU Ziheng, NING Baifeng, et al. Review of research progress and development trend of Internet of Things demand attack on power system[J]. Southern Power System Technology, 2020, 14(1): 24-30. | |
| [3] | 化存卿. 物联网安全检测与防护机制综述[J]. 上海交通大学学报, 2018, 52(10): 1307-1313. |
| HUA Cunqing. A survey of security detection and protection for Internet of Things[J]. Journal of Shanghai Jiao Tong University, 2018, 52(10): 1307-1313. | |
| [4] | 文志诚, 陈志刚, 唐军. 基于聚类分析的网络安全态势评估方法[J]. 上海交通大学学报, 2016, 50(9): 1407-1414. |
| WEN Zhicheng, CHEN Zhigang, TANG Jun. Network security assessment method based on cluster analysis[J]. Journal of Shanghai Jiao Tong University, 2016, 50(9): 1407-1414. | |
| [5] | KIM Y, KOLESNIKOV V, KIM H, et al. SSTP: A scalable and secure transport protocol for smart grid data collection[C]// 2011 IEEE International Conference on Smart Grid Communications. Brussels, Belgium: IEEE, 2011: 161-166. |
| [6] |
DE RANGO F, POTRINO G, TROPEA M, et al. Energy-aware dynamic Internet of Things security system based on elliptic curve cryptography and message queue telemetry transport protocol for mitigating replay attacks[J]. Pervasive and Mobile Computing, 2020, 61:101105.
doi: 10.1016/j.pmcj.2019.101105 URL |
| [7] | SHAFER G. A mathematical theory of evidence[M]. Princeton: Princeton University Press, 1976: 23-29. |
| [8] | 蒋雯, 邓鑫洋. D-S证据理论: 信息建模与应用[M]. 北京: 科学出版社, 2018: 8-17. |
| JIANG Wen, DENG Xinyang. Dempster-Shafer evidence theory: Information modeling and application[M]. Beijing: Science Press, 2018: 8-17. | |
| [9] | MUKKAMALA S, SUNG A, ABRAHAM A. Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools[J]. Enhancing Computer Security with Smart Technology, 2005, 3(2): 125-163. |
| [10] | 王洪勉, 孙慧, 郑利斌, 等. 泛在电力物联网智联单元设计与实现[J]. 供用电, 2019, 36(6): 5-9. |
| WANG Hongmian, SUN Hui, ZHENG Libin, et al. Design and implementation of wisdom unit in the ubiquitous Internet of Things in electricity[J]. Distribution & Utilization, 2019, 36(6): 5-9. |
| [1] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
| [2] | HE Jun* (何俊), ZHENG Shi-hui (郑世慧). Intrusion Detection Model with Twin Support Vector Machines [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 448-454. |
| [3] | ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1. A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers [J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 899-906. |
| [4] |
ZHANG Lei,CAO Zhenfu . An AttributeBased Encryption Scheme Suitable for Distributed Network [J]. Journal of Shanghai Jiaotong University, 2010, 44(11): 1507-1512. |
| [5] |
ZHANG Baowen1,LUO Zheng2,XUE Zhi1,YIN Ying1 . A Network Risk Assessment Model Based on Network Global Privilege Graph [J]. Journal of Shanghai Jiaotong University, 2010, 44(09): 1197-1200. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||