共 50 条
- [1] Network Security Situation Assessment Based on HMM [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 387 - +
- [2] Network Security Risk Assessment Method Based on HMM and Attack Graph Model [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [3] Network security assessment based on node correlated HMM [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (06): : 121 - 124
- [4] Network Security Situation Assessment Based on HMM-MPGA [J]. PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016), 2016,
- [5] Network Risk Assessment Based on Baum Welch Algorithm and HMM [J]. Mobile Networks and Applications, 2021, 26 : 1630 - 1637
- [6] Network Risk Assessment Based on Baum Welch Algorithm and HMM [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1630 - 1637
- [7] Research on Key Technologies of Network Security Multidimensional Dynamic Risk Assessment [J]. 2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, : 389 - 393
- [8] Network Security Risk Assessment Based on Node Correlation [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
- [9] Network Security Risk Assessment Based on Association Rules [J]. ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
- [10] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347