최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기KSII Transactions on internet and information systems : TIIS, v.12 no.5, 2018년, pp.2414 - 2428
Li, Xi (Information Engineering Department Ordnance Engineering College) , Lu, Yu (Information Engineering Department Ordnance Engineering College) , Liu, Sen (The 54th Research Institute of CETC) , Nie, Wei (College of Information Engineering Shenzhen University)
In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Gong Z H, Zhuo Y. "Research on Cyberspace Situational Awareness," Journal of Software, vol.21, no.7, pp.1605-1619, 2010.
Boyer S, Dain O, Cunningham R. "Stellar: A fusion system for scenario construction and security risk assessment," in Proc. of the 13th IEEE Int'l Workshop on Information Assurance, pp.105-116, 2015.
Ramaki A A, Khosravi-Farmad M, Bafghi A G. "Real time alert correlation and prediction using Bayesian networks," in Proc. of the ISCISC, pp.98-103, 2015.
Xie L X, Wang Y C, Yu J B. "Network Security Situation Awareness Approach Based on Markov Game Model," J Tsinghua Univ (Sci & Technol), vol.53, no.12, pp.1750-1760, 2013.
Li F W, Sun S, Zhu J, etal. "Situation Assessment Method based on Hidden Markov Model," Computer Engineering and Design, vol.36, no.7, pp.1706-1711, 2015.
Wen Z C, Chen Z G. "Network security situation prediction method based on hidden Markov model," Journal of Central South University (Science and Technology), vol.46, no.10, pp.3689-3695, 2015.
Xi R R, Yun X C, Zhang Y Z, etal. "An Improved Quantitative Evaluation Method for Network Security," Chinese Journal of Computers, vol.38, no.4, pp.749-758, 2015.
Guan-Yu Hu, Zhi-Jie Zhou, Bang-Cheng Zhang, etal. "A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm," Applied Soft Computing, vol.48, pp.404-418, 2016.
Bass T. "Multi sensor data fusion for next generation distributed intrusion detection systems," in Proc. of the'99 IRIS National Symp. on Sensor and Data Fusion. pp.24-27, 1999.
Bass T. "Intrusion detection systems and multi sensor data fusion," Communications of the ACM, vol.43, no.4, pp.99-105, 2000.
Gad A, Farooq M. "Data fusion architecture for maritime surveillance," in Proc. of the Int'l Society on Information Fusion(ISIF), pp.448-455, 2002.
Kadar I. "Knowledge representation issues in perceptual reasoning managed situation assessment," in Proc. of the FUSION, pp.13-15, 2005.
Llinas J, Hall D. "An introduction to multi sensor data fusion," in Proc. of the ISCAS '98 - Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, vol. 6, pp.537-540, 1998.
Blasch E, Plano S. "DFIG level5 issues supporting situational assessment reasoning," in Proc. of the FUSION, pp.35-43, 2005.
Zhang Y, Tan X B, Cui X L, etal. "Network Security Situation Awareness Approach Based on Markov Game Model," Journal of Software, vol.22, no.3, pp.495-508, 2011.
The snort project. "SNORT Users Manual,"
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.