共 15 条
- [1] Wang H., Chen Z.F., Feng X., Et al., Research on network security situation assessment and quantification method based on analytic hierarchy process, Wireless Personal Communications, 102, 2, pp. 1401-1420, (2018)
- [2] Zhou C., Pan P., Mao X.Y., Et al., Risk analysis of information system security based on distance of information-state transition, Wuhan University Journal of Natural Sciences, 23, 3, pp. 210-218, (2018)
- [3] Wen Z.C., Chen Z.G., Tang J., Assessing network security situation quantitatively based on information fusion, Journal of Beijing University of Aeronautics and Astronautics, 42, 8, pp. 1593-1602, (2016)
- [4] Yu J.J., Hu M., Wang P., Evaluation and reliability analysis of network security risk factors based on D-S evidence theory, Journal of Intelligent & Fuzzy Systems, 34, 2, pp. 861-869, (2018)
- [5] Zhu W.Y., Network security situation assessment based on Kalman entropy model, Journal of Huaqiao University (Natural Science), 38, 1, pp. 101-104, (2017)
- [6] Hu G.Y., Zhou Z.J., Zhang B.C., Et al., A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm, Applied Soft Computing, 48, pp. 404-418, (2016)
- [7] Xie L.X., Wang Y.C., Yu J.B., Network security situation awareness based on neural networks, Journal of Tsinghua University (Science & Technology), 53, 12, pp. 1750-1760, (2013)
- [8] Doersch C., Tutorial on variational autoencoders, (2016)
- [9] An J., Cho S., Variational autoencoder based anomaly detection using reconstruction probability, (2015)
- [10] Goodfellow I.J., Pouget-Abadie J., Mirza M., Et al., Generative adversarial nets, Proceedings of the 27th International Conference on Neural Information Processing Systems, pp. 1-9, (2014)