CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph
暂无分享,去创建一个
Kun Li | Huachun Zhou | Bohao Feng | Zhe Tu
[1] Muhammad Ali Babar,et al. An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems , 2019, 2019 IEEE/ACM International Conference on Software and System Processes (ICSSP).
[2] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[3] Wanlei Zhou,et al. Modeling malicious activities in cyber space , 2015, IEEE Network.
[4] Song Guo,et al. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.
[5] Minyi Guo,et al. A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking , 2016, IEEE Transactions on Computers.
[6] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[7] Hongke Zhang,et al. Locator/Identifier Split Networking: A Promising Future Internet Architecture , 2017, IEEE Communications Surveys & Tutorials.
[8] Ali A. Ghorbani,et al. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).
[9] Hongke Zhang,et al. HetNet: A Flexible Architecture for Heterogeneous Satellite-Terrestrial Networks , 2017, IEEE Network.
[10] Yan Jia,et al. Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network , 2018, 2018 IEEE 18th International Conference on Communication Technology (ICCT).
[11] Zhiyong Feng,et al. Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things , 2017, IEEE Access.
[12] Sanming Zhou,et al. Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.