[1] Rob McMillan. Definition: Threat intelligence [EB/OL]. (2013-03-16)
[2019-09-26]. https://www.gartner.com/doc/2487216
[2] IntSights. Financial services threat landscape report: The dark web perspective[EB/OL](2018-08-01)[2019-09-26].https://intsights.com/resources/financial-services-threat-landscape-report-july-2018
[3] 王知津, 范淑杰, 王丽娜. 竞争情报搜集与利用中的信息资产[J]. 图书馆学研究,2011,4:2-6
[4] Konrad R, Philipp T, Carsten W, et al. Automatic analysis of malware behavior using machine learning[J]. Computer Science. 2011, 19(4): 639–668
[5] Elike H, Xavier B, Andrew H, et al. Threat analysis of IoT networks using artificial neural network intrusion detection system [C] //Proc of the 2016 Int Symp on Networks, Computers and Communications (ISNCC). Piscataway,NJ: IEEE, 2016
[6] Alan S, Richard E O, Tomasz R. Detection of known and unknown DDos attacks using artificial neural networks[J]. Neurocomputing, 2016, 172: 385–393
[7] 张清海. 唯有“精准”才能有效——对竞争情报支撑企业决策的再认识[J]. 竞争情报, 2014(3): 8-10
[8] Sabottke C, Suciu O, Dumitras T. Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits[C]//Proc of the 24th USENIX Security Symp. Berkeley, CA: USENIX Association, 2015
[9] Nunes E, Diab A, Gunn A, et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence [C] //Proc of IEEE Conf on Intelligence and Security Informatics (ISI). Piscataway,NJ: IEEE, 2016: 7-12
[10] Dong Fangzhou, Yuan Shaoxian, Ou Haoran, et al. New cyber threat discovery from darknet marketplaces [C] //Proc of IEEE Conf on Big Data and Analytics (ICBDA). Piscataway,NJ: IEEE, 2018: 62-67
[11] Sapienza A, Bessi A, Damodaran S, et al. Early warnings of cyber threats in online discussions [C] //Proc of IEEE Int Conf on Data Mining Workshops (ICDMW).Piscataway NJ: IEEE, 2017: 667-674
[12] 张永超, 王宇平. 暗网资源挖掘的关键技术研究[D]. 西安: 西安电子科技大学, 2013
[13] 王黎, 帅建梅. 搜索引擎的相关性排序算法研究[D]. 合肥: 中国科学技术大学, 2010
[14] 陆伟, 刘屹, 孟睿, 等. 基于域加权聚类算法的网络輿情热点话题探测[J]. 数字图书馆论坛, 2011,8: 50-56
[15] 秦喜艳, 陆伟, 姜捷璞. 信息检索中的相关性判断和系统评价述评. 图书情报知识, 2009, 4: 89-94
[16] 朱红灿, 陈能华, 周永红. 计算Web页面信息熵的方法[J]. 计算机工程与设计. 2010, 31(1): 114-117
[17] 李涛, 张景肖. 基于BT-SVM模型组合的动态加权多分类算法研究[J]. 统计与信息论坛. 2019, 34(1): 20-24
[18] 张谦, 高章敏, 刘嘉勇. 基于Word2vec的微博短文本分类研究[J]. 信息网络安全, 2017 (1): 57-62
[19] 周志华. 机器学习[M]. 北京: 清华大学出版社, 2016: 121-139
[20] Pedregosa F, Varoquaux G, Gramfort A, et al. Scikit-learn: Machine learning in Python[J]. Journal of Machine Learning Research, 2011, 12(10): 2825-2830
[21] Manning C D, Surdeanu M, Bauer J, et al. The stanford coreNLP natural language processing toolkit [C] //Proc of the 52nd Annual Meeting of the Association for Computational Linguistics. Stroudsburg,PA: ACL, 2014: 55-60
|