Assessing Cyber-threats Situation for Electric Power Information Networks
暂无分享,去创建一个
Jing Wang | Huan Li | Yufei Wang | Zhibo Xu | Yufei Wang | Jing Wang | Zhibo Xu | Huan Li
[1] Feng Li. Research on hierarchical network security threat situation assessment , 2011 .
[2] Chen Xiu. Quantitative Hierarchical Threat Evaluation Model for Network Security , 2006 .
[3] Zhang Xiang,et al. Research on Network Attack Situation Forecast Technique Based on Support Vector Machine , 2007 .
[4] Wang Bao-shu. Research on the Bayesian networks model in situation assessment , 2009 .
[5] Wei Yong. Method of Security Situation Assessment Based on Graph Clustering , 2009 .
[6] Gao Kunlun. A Hybrid Security Situation Prediction Model for Information Network Based on Support Vector Machine and Particle Swarm Optimization , 2011 .
[7] Yang Ai-min,et al. P2P traffic classification method based on SVM , 2008 .
[8] Wang Yufei. A Study on Electric Power Information Network-Oriented Security Situation Awareness , 2013 .
[9] Luo Yun-qian. Application of Graph Theory in Threat Situation Analysis of Network Security , 2009 .
[10] Chen Shaohua,et al. Mining Algorithm for Constrained Maximum Frequent Itemsets Based on Frequent Pattern Tree , 2011 .
[11] Wang Shuang. Security situation evaluation system for large scale network , 2008 .
[12] Yuan Huan. Method of Network Attack Graph Generation Based on Greedy Policy , 2011 .
[13] Zhu Jianjun. Research on evaluations of several grey relational models adapt to grey relational axioms , 2009 .