1Bass T. Multisensor Data Fusion for Next Generation Distributed IntrusionDetection Systems[C]. 1999 IRIS National Symposium on Sensor and DataFusion, 1999:24-27. 被引量:1
2Blyth A.Footprinting for intrusion detection and threat assessment[R]. Infor-mation Security Technical Report. 1999,4(3):43-53. 被引量:1
3D' Ambrosio B,Takikawa M,Upper D,Fitzgerald J,Mahoney S.Security situ-ation assessment and response evaluation[C].Proceedings of the DARPA In-formation Survivability Conf,&Exposition II,Anaheim,California,USA,2001:387-394. 被引量:1
4Ahmed M, Al-Shaer E, Khan L. A novel quantitative approach for measuringnetwork security[C].Proceedings of the 27th Conference on Computer Com-munications. Piscataway,NJ:IEEE,2008:195 7-1965. 被引量:1
5Gorodetsky V,Karsaeyv 0,Samoilov V. On-line update of situation assess-ments generic approach[J].International Journal of Knowledge-Based&Intel-ligent Engineering Systems,2005,9(4):361 -365. 被引量:1
6Stephen E.Smith.Tightening the net:Examining and Demonstrating Common-ly Available Network Security Tools[D].Submitted to the Faculty of the De-partment of Computing and Mathematical Sciences Texas A&M University,Corpus Christi,Texas, 2012. 被引量:1
2BASS T. Intrusion detection systems & multisensory data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105. 被引量:1
3D'AMBROSIO B. Security Situation Assessment and Response Evaluation (SSARE) [C]// DISCEX'01: Proceedings of 2001 DARPA Information Survivability Conference & Exposition. Washington, D.C.: IEEE Computer Society, 2001: 387-394. 被引量:1
4ABAD C, YURCIK W. UCLog+: a security situational awareness system for incident storage, querying, and correlation [C]// ICTSM 2006: Proceedings of the 14th International Conference on Telecommunication Systems Modeling and Analysis. Washington, D.C.: IEEE Computer Society, 2006: 316-322. 被引量:1
5ONWUBIKO C, OWENS T. Situational awareness in computer network defense principles, methods and applications [M]. Hershey: IGI Global Snippet, 2012: 125-137. 被引量:1
6KAVOUSI F, AKBARI B. Automatic learning of attack behavior patterns using Bayesian networks [C]// IST'2012: Proceedings of the 6th International Symposium on Telecommunications. Washington, D.C.: IEEE Computer Society, 2012: 999-1004. 被引量:1