期刊文献+

网络安全战略预警系统的特征信息融合方法 被引量:6

Characteristic Information Fusion Method on Network Security Strategic Indication/Warning System
下载PDF
导出
摘要 提出将一种特征信息融合的方法-基于模糊神经网络的方法引入到战略预警系统的威胁评测中并进行了相关规则的推理Mamdani,,证实了该方法的可行性及合理性。 This paper brings forward a method of characteristic information fusion, which is based on Mamdani fuzzy neural network method, applies on threat assessment on network security strategic indication/warning system, speculates correlate rules,and proves the method to be feasible and rational.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第7期61-62,169,共3页 Computer Engineering
基金 国家基金资助项目()863-301-05-04
关键词 网络安全战略预警系统 特征信息融合 模糊逻辑 神经网络 计算机网络 Information fusion Fuzzy reasoning Neural network Threat assessment
  • 相关文献

参考文献1

二级参考文献1

  • 1张文修,不确定性推理原理,1996年

共引文献3

同被引文献22

  • 1陈秀真,郑庆华,管晓宏,冯力.基于模糊信息融合的漏洞评估方法[J].小型微型计算机系统,2004,25(8):1424-1427. 被引量:5
  • 2[1]The national strategy to secure cyberspace.http://www.whitehouse.gov/pcipb/cyberspace_ strategy.pdf,2003
  • 3[3]Piotr Kijewski.ARAKIS-An early warning and attack identification system.The 16th Annual FIRST Conf,Dudapest,Hungary,2004
  • 4[8]P Ning,D Reeves,Yun Cui.Correlating alerts using prerequisites of intrusions.North Carolina State University,Department of Computer Science,Tech Rep:TR-2001-13,2001
  • 5[9]P Ning,Y Cui,D S Reeves.Constructing attack scenarios through correlation of intrusion alerts.The 9th ACM Conf on Computer and Communications Security,Washington D C,2002
  • 6Rathmell A,Dorschner J,Knights M,et al. Summary of Research Results:Threat Assessment and Early Warning Methodologies for Information Assurance[EB/OL]. http://www.iaac.org.uk/Publications/ROPA/Website%20summary.pdf,2003.
  • 7Rathmell A,Overill R,Valeri L. Information Warfare Attack Assessment System[EB/OL]. http://www.kcl.ac.uk/orgs/icsa/Old/iwaasppr.PDF,2003.
  • 8Eskin E,Miller M,et al. Adaptive Model Generation for Intrusion Detection Systems[EB/OL]. http://www.cs.columbia.edu/ids/FCblications/adaptive-ccsids00.pdf,2003.
  • 9Lee W,Stolfo SJ,et al. Real-Time Data Mining-based Intrusion Detection[EB/OL]. http://www.cs.columbia.edu/ids/concept/,2003.
  • 10Lee W,Stolfo SJ,Mok K. Data mining in work flow environments:Experiences in intrusion detection[A]. Proceedings of the 1999 conference on Knowledge Discovery and Data Ming(KDD-99)[C]. 1999.

引证文献6

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部