吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (2): 556-567.doi: 10.13229/j.cnki.jdxbgxb201602034
• Orginal Article • Previous Articles Next Articles
GE Lin, JI Xin-Sheng, JIANG Tao
CLC Number:
[1] GB/Z 20986-2007.信息安全事件分类分级指南[S]. [2] 中国互联网络信息中心. 2013年中国网民信息安全状况研究报告[R]. 中国互联网络信息中心, 中国, 2013. [3] 陈训逊, 方滨兴, 胡铭曾, 等. 一个网络信息内容安全的新领域-网络信息渗透检测技术[J]. 通信学报, 2004, 25(7): 185-191. Chen Xun-xun, Fang Bin-xing, Hu Ming-zeng, et al. A new field in security of internet information and content-network information penetration detection technology[J]. Journal of China Institute of Communications, 2004, 25(7): 185-191. [4] Fang Bin-xing, Guo Yun-chuan, Zhou Yuan. Information content security on the Internet: the control model and its evaluation[J]. Science China, 2010, 53(1): 30-49. [5] 万源. 基于语义统计分析的网络舆情挖掘技术研究[D]. 武汉:武汉理工大学计算机学院, 2012. Wan Yuan. Research on mining of internet public opinion based on semantic and statistic analysis[D]. Wuhan :School of Computer Science and Technology,Wuhan University of Technology, 2012. [6] Barroso N, Lopez de Ipina K L, Ezeiza A, et al. An ontology-driven semantic speech recognition system for security tasks[C]//Proceeding of IEEE International Carnahan Conference on Security Technology, Barcelona,2011:1-6. [7] Roesch M. Snort-lightweight intrusion detection for networks[C]//Proceedings of the 13th System Administration Conference, Seattle,1999: 229-238. [8] Porras P A, Fong M W, Valdes A. A mission-impact-based approach to INFOSEC alarm correlation[C]//Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, Zurich,2002:95-114. [9] Hariri S, Qu G Z, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks[J]. IEEE Security and Privacy, 2003, 1(5): 49-54. [10] 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17( 4) : 885-897. Chen Xiu-zhen, Zheng Qing-hua, Guan Xiao-hong, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885- 897. [11] Arnes A, Valeur F, Vigna G, et al. Using hidden markov models to evaluate the risk of intrusions[C]//Proceedings of the International Symposium on the Recent Advances in Intrusion Detection, Hamburg,2006:145-164. [12] 韦勇, 连一峰, 冯登国. 基于信息融合的网络安全态势评估模型[J]. 计算机研究与发展,2009, 46(3): 353-362. Wei Yong, Lian Yi-feng, Feng Deng-guo. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353-362. [13] Ahmed M S, Al-Shaer E, Taibah M, et al. Objective risk evaluation for automated security management[J]. Journal of Network and Systems Management, 2011, 19(3): 343-366. [14] IEEE VAST 2008 Challenge[EB/OL] .[2008-03-15] https://www.cs.umd.edu/hcil/VASTcha-llenge08. [15] Enron Email Dataset[EB/OL] .[2011-04-02] https://www.cs.cmu.edu/~enron/. |
[1] | YING Huan,LIU Song-hua,TANG Bo-wen,HAN Li-fang,ZHOU Liang. Efficient deterministic replay technique based on adaptive release strategy [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1917-1924. |
[2] | LIU Zhong-min,WANG Yang,LI Zhan-ming,HU Wen-jin. Image segmentation algorithm based on SLIC and fast nearest neighbor region merging [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1931-1937. |
[3] | SHAN Ze-biao,LIU Xiao-song,SHI Hong-wei,WANG Chun-yang,SHI Yao-wu. DOA tracking algorithm using dynamic compressed sensing [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1938-1944. |
[4] | ZHONG Wei, JUAN Zhi-cai, SUN Bao-feng. Hierarchical hub location model for integration of urban and rural public transport in an incomplete network [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1387-1397. |
[5] | SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264. |
[6] | YAO Hai-yang, WANG Hai-yan, ZHANG Zhi-chen, SHEN Xiao-hong. Reverse-joint signal detection model with double Duffing oscillator [J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290. |
[7] | QUAN Wei, HAO Xiao-ming, SUN Ya-dong, BAI Bao-hua, WANG Yu-ting. Development of individual objective lens for head-mounted projective display based on optical system of actual human eye [J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297. |
[8] | CHEN Mian-shu, SU Yue, SANG Ai-jun, LI Pei-peng. Image classification methods based on space vector model [J]. 吉林大学学报(工学版), 2018, 48(3): 943-951. |
[9] | CHEN Tao, CUI Yue-han, GUO Li-min. Improved algorithm of multiple signal classification for single snapshot [J]. 吉林大学学报(工学版), 2018, 48(3): 952-956. |
[10] | HE Xiang-kun, JI Xue-wu, YANG Kai-ming, WU Jian, LIU Ya-hui. Tire slip control based on integrated-electro-hydraulic braking system [J]. 吉林大学学报(工学版), 2018, 48(2): 364-372. |
[11] | MENG Guang-wei, LI Rong-jia, WANG Xin, ZHOU Li-ming, GU Shuai. Analysis of intensity factors of interface crack in piezoelectric bimaterials [J]. 吉林大学学报(工学版), 2018, 48(2): 500-506. |
[12] | LIN Jin-hua, WANG Yan-jie, SUN Hong-hai. Improved feature-adaptive subdivision for Catmull-Clark surface model [J]. 吉林大学学报(工学版), 2018, 48(2): 625-632. |
[13] | WANG Ke, LIU Fu, KANG Bing, HUO Tong-tong, ZHOU Qiu-zhan. Bionic hypocenter localization method inspired by sand scorpion in locating preys [J]. 吉林大学学报(工学版), 2018, 48(2): 633-639. |
[14] | YU Hua-nan, DU Yao, GUO Shu-xu. High-precision synchronous phasor measurement based on compressed sensing [J]. 吉林大学学报(工学版), 2018, 48(1): 312-318. |
[15] | WANG Fang-shi, WANG Jian, LI Bing, WANG Bo. Deep attribute learning based traffic sign detection [J]. 吉林大学学报(工学版), 2018, 48(1): 319-329. |
|