[1] Bass T. Intrusion detection systems and multisensor data fusion[J]. Communications of the Acm, 2000, 43(4):99-105.
[2] 沈昌祥, 张焕国, 冯登国,等. 信息安全综述[J]. 中国科学:技术科学, 2007, 37(2):129-150.
[3] 唐成华, 余顺争. 一种基于似然BP的网络安全态势预测方法[J]. 计算机科学, 2009, 36(11):97-100.
[4] Salerno J, Hinman M, Boulware D. Building a framework for situation awareness[J]. 2004.
[5] Arnes A, Valeur F, Vigna G, et al. Using Hidden Markov Models to Evaluate the Risks of Intrusions[C]// International Workshop on Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2006:145-164.
[6] Lau S. The Spinning Cube of Potential Doom.[J]. Communications of the Acm, 2004, 47(6):25-26.
[7] 韦勇, 连一峰. 基于日志审计与性能修正算法的网络安全态势评估模型[J]. 计算机学报, 2009, 32(4):763-772.
[8] 张勇, 谭小彬, 崔孝林,等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011, 22(3):495-508.
[9] Huang G B, Zhu Q Y, Siew C K. Extreme learning machine: Theory and applications[J]. Neurocomputing, 2006, 70(1):489-501.
[10] Feng G, Huang G B, Lin Q, et al. Error minimized extreme learning machine with growth of hidden nodes and incremental learning[J]. IEEE Trans Neural Netw, 2009, 20(8):1352-1357.
|