[1]郭宁. 信息安全风险评估指标体系研究[J]. 信息技术与标准化, 2006, 5: 1721[ 2]Chang BeomHwan, Kim DongSoo, Kim HyunKu, et al. Active security management based on secure zone cooperation[J]. Future Generation Computer Systems, 2004, 20: 283293[3]Woerner J, Woern H. A security architecture integrated cooperative engineering platform for organised model exchange in a digital factory environment[J]. Computers in Industry, 2005, 56: 347360[4]Kim Seoksoo, Kim Soongohn, Lee Geuk. Structure design and test of enterprisesecurity management system with advanced internal security[J]. Future Generation Computer Systems, 2006(2): 16[5]Leong K K, Yu K M, Lee W B. A security model for distributed product data management system[J]. Computers in Industry, 2003, 50: 179193[6]Arcsight[OL]. [20150618]. http: www. arcsight. com[7]Splunk[OL]. [20150618]. http:www.splunk.com[8]Kruegel C, Robertson W. Event verification: Determining the success of intrusion attempts[C] Proc of the 1st Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Dortmund: GI, 2004: 2538[9]Zadeh L A. Fuzzy sets[J]. Fuzzy Logic & Fuzzy Systems, 1965, 8(65): 338353[10]Bonafede C E, Giudici P. Bayesian networks for enterprise risk assessment[J].Physica AStatistical Mechanics and Its Application, 2007, 382(1): 2228[11]宫秀军, 孙建平, 史忠植. 主动贝叶斯网络分类器[J]. 计算机研究与发展, 2002, 39(5): 574579[12]张云涛, 龚玲. 数据挖掘原理与技术[M]. 北京: 电子工业出版社, 2004[13]罗文, 李敏勇, 张晓锐. 基于贝叶斯网络的态势认识[J]. 火力与指挥控制, 2010, 35(3): 8992[14]Apache Kafka[OL]. [20150618]. http:kafka.apache.org |