共 50 条
- [21] Network Security Risk Assessment Method Based on HMM and Attack Graph Model [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [22] Real-time correlation of network security alerts [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 73 - +
- [23] The system security enhancement with real-time attack detection and analysis [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E66 - E71
- [24] Real-time Network Attack Intention Recognition Algorithm [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 51 - 61
- [25] Real-time Network Security Situation Visualization and Threat Assessment Based on Semi-Markov Process [J]. FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
- [26] Real-time risk assessment with network sensors and intrusion detection systems [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 388 - 397
- [27] Knowledge-Based Framework for Real-Time Risk Assessment of Information Security Inspired by Danger Model [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 1053 - +
- [28] Real-time risk assessment on equipment failure outage of distribution network [J]. Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2014, 34 (11): : 89 - 94
- [29] Docker Security: A Threat Model, Attack Taxonomy and Real-Time Attack Scenario of DoS [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 150 - 155
- [30] Quantitative evaluation approach for real-time risk based on attack event correlating [J]. Ge, H.-H. (haiyiyanglan@126.com), 1600, Science Press (35):