Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks
暂无分享,去创建一个
Hui He | Min Liu | Xing Wang | Weizhe Zhang | Dongyan Zhang | Junxi Guo | Junxi Guo | Weizhe Zhang | Min Liu | Xing Wang | Hui He | Dongyang Zhang
[1] Tai-Hoon Kim,et al. Detecting bad information in mobile wireless networks based on the wireless application protocol , 2013, Computing.
[2] Di Wu,et al. Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities Set: Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities Set , 2012 .
[3] A. B. Mohamed,et al. Alert correlation framework using a novel clustering approach , 2012, 2012 International Conference on Computer & Information Science (ICCIS).
[4] Yongzheng Zhang,et al. Network Threat Assessment Based on Alert Verification , 2011, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.
[5] Sheng-Yuan Wang,et al. Survey of Information Security Risk Assessment , 2010, 2010 International Conference on Electrical and Control Engineering.
[6] Gong Zheng,et al. Research on Cyberspace Situational Awareness , 2010 .
[7] Paramvir Bahl,et al. Detailed diagnosis in enterprise networks , 2009, SIGCOMM '09.
[8] Zahid Anwar,et al. Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[9] Liang Ying. Research on Key Technologies for Implementing Network Security Situation Awareness , 2008 .
[10] Hongsheng Xi,et al. A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[11] Tai-Myung Chung,et al. Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security , 2007, International Conference on Computational Science.
[12] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[13] Chen Xiu. Quantitative Hierarchical Threat Evaluation Model for Network Security , 2006 .
[14] Wang Hui,et al. Survey of Network Situation Awareness System , 2006 .
[15] Jing Wu,et al. Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[16] Song Chen. A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security , 2005 .
[17] Mário M. Freire,et al. Intelligent Assessment of Distributed Security in TCP/IP Networks , 2004, HSNMC.
[18] K. Clark,et al. Qualitative and quantitative analytical techniques for network security assessment , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[19] Dai Zong-kun. Model of Multilevel Fuzzy Comprehensive Risk Evaluation of Information System , 2004 .
[20] George Cybenko,et al. Quantitative risk analysis of computer networks , 2003 .
[21] Duan Yun. Information System Security Metrics and Evaluation Model , 2003 .
[22] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[23] Yuanlong Yu,et al. Network Intrusion Detection , 2022 .