[1] Pike R, Presotto D, Thompson K, et al. The use of name spaces in Plan 9[C]//Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring. ACM, 1992: 1-5.
[2] Denning D E. An intrusion-detection model[J]. IEEE Transactions on software engineering, 1987 (2): 222-232.
[3] Heberlein L T, Dias G V, Levitt K N, et al. A network security monitor[C]//Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE, 1990: 296-304.
[4] Endsley M R. Toward a theory of situation awareness in dynamic systems[J]. Human factors, 1995, 37(1): 32-64.
[5] Bass T. Multisensor data fusion for next generation distributed intrusion detection systems[C]//Proceedings of the IRIS National Symposium on Sensor and Data Fusion. COAST Laboratory, Purdue University, WestLafayette, Indiana, 1999, 24(28): 24-27.
[6] 管磊, 胡光俊, 王专. 基于大数据的网络安全态势感知技术研究[J]. 信息网络安全, 2016, 16(9): 45-50.
[7] 毛军礼,汲锡林.基于大数据的网络态势感知体系架构[J].无线电通信技术,2018,44( 3) : 217-223.
[8] 李彬.面向关键基础设施的网络安全态势感知体系研究[J].信息与电脑(理论版),2017(12):203-205.
[9] 卢庆,文卫疆,陈新.大数据技术支持下的网络安全态势感知技术探究[J].网络安全技术与应用,2018(10):63-64.