[1]丁兆云, 刘凯, 刘斌, 等. 网络安全知识图谱研究综述[J]. 华中科技大学学报: 自然科学版, 2021, 49(7): 7991[2]Bordes A, Usunier N, GarciaDuran A, et al. Translating embeddings for modeling multirelational data[C] Proc of the 26th Int Conf on Neural Information Processing Systems. New York: ACM, 2013: 27872795[3]Lao Ni, Cohen W C. Relational retrieval using a combination of pathconstrained random walks[J]. Machine Learning, 2010, 81(1): 5367[4]Schlichtkrull M, Kipf T N, Bloem P, et al. Modeling relational data with graph convolutional networks[C] Proc of the 15th Semantic Web Int Conf. Berlin: Springer, 2018: 593607[5]Wang Hongwei, Ren Hongyu, Leskovec J. Relational message passing for knowledge graph completion[C] Proc of the 27th ACM SIGKDD Conf on Knowledge Discovery & Data Mining. New York: ACM, 2013: 16971707[6]马标, 金映言, 那幸仪, 等. 工业控制系统入侵检测技术研究综述[J].计算机应用与软件, 2023, 40(5): 1018[7]Wu Yixiong, Zhuge Jianwei, Yin Tingting, et al. From exposed to exploited: Drawing the picture of industrial control systems security status in the Internet age[C] Proc of the 7th Int Conf on Information Systems Security and Privacy. Berlin: Springer, 2021: 237248[8]Jacobs J, Romanosky S, Edwards B, et al. Exploit prediction scoring system (EPSS) [J]. Digital Threats: Research and Practice, 2021, 2(3): 117[9]Sharma R, Sibal R, Sabharwal S. Software vulnerability prioritization using vulnerability description [J]. International Journal of System Assurance Engineering and Management, 2021, 12: 5864[10]Yin Jiao, Tang Mingjian, Cao Jinli, et al. Vulnerability exploitation time prediction: An integrated framework for dynamic imbalanced learning [J]. World Wide Web, 2022, 25(1): 401423[11]王敬, 张淼, 刘杨, 等. 面向流程工业控制的双安融合知识图谱研究[J]. 计算机科学, 2023, 50(9): 6874[12]Sun Zhiqing, Deng Zhihong, Nie Jianyun, et al. RotatE: Knowledge graph embedding by relational rotation in complex space[C] Proc of Int Conf on Learning Representations. Vancouver, BC, Canada: ICLR, 2018[13]Abboud R, Ceylan I, Lukasiewicz T, et al. BoxE: A box embedding model for knowledge base completion[C] Proc of the 34th Int Conf on Neural Information Processing Systems. New York: ACM, 2020: 96499661[14]Lin Yankai, Liu Zhiyuan, Luan Huanbo, et al. Modeling relation paths for representation learning of knowledge bases[C] Proc of the 2015 Conf on Empirical Methods in Natural Language Processing. Menlo Park, CA: ACL, 2015: 705714[15]Niu Guanglin, Li Bo, Zhang Yongfei, et al. Joint semantics and datadriven path representation for knowledge graph reasoning [J]. Neurocomputing, 2022, 483(3): 249261[16]Wang Zikang, Li Linjing, Zeng Dajun. SRGCN: Graphbased multihop reasoning on knowledge graphs [J]. Neurocomputing, 2021, 454(24): 280290[17]Wang Zibo, Huo Chaobin, Zhang Yaofang, et al. Critical relation path aggregationbased industrial control component exploitable vulnerability reasoning [J]. Computers, Materials & Continua, 2023, 75(2): 29572979[18]赵慧. 欧盟网络防御政策研究[J]. 信息安全研究, 2024, 10(1): 9496
|