期刊文献+

水利网络安全监测与预警方法 被引量:3

Water conservancy cybersecurity monitoring and early warning methods
下载PDF
导出
摘要 指出水利网络面临的主要安全威胁,介绍水利网络安全监测方法,阐述水利网络安全预警机制,明确监测预警在水利网络安全工作中的重要性,展望态势感知技术在水利网络安全监测预警中的应用前景。 This paper points out the main security threat facing by the water conservancy cyber, introduces the security monitoring methods of water conservancy cyber, expounds the cybersecurity early warning mechanism of water conservancy, clears the importance of cybersecurity monitoring and early warning in the water conservancy, porecasts application prospect of situation awareness technology in cyber security monitoring and early warning of water conservancy.
作者 陈岚 周维续 CHEN Lan ZHOU Weixu(Water Resources Information Center, the Ministry of Water Resource, Beijing 100053, China)
出处 《水利信息化》 2017年第3期29-32,37,共5页 Water Resources Informatization
关键词 水利 网络安全 信息化 监测 预警 信息通报 water conservancy cybersecurity informationize monitoring early warning information notification
  • 相关文献

参考文献2

二级参考文献49

  • 1刘超,谢宝陵,祝伟玲,徐国明,刘万立.基于数据融合模型的网络安全分析评估系统[J].计算机工程,2005,31(13):140-141. 被引量:7
  • 2Theureau J.Use of nuclear-reactor control room simulators inresearch & development.In:7th IFAC/IFIP/IFORS/IEA Symposium on Analysis,Design and Evaluation of MAN-MACHINE SYSTEMS,Kyoto.1998.425~430
  • 3Endsley M R.Design and evaluation for situation awareness enhancement.Paper presented at the Human Factors Society 32nd Annual Meeting.Santa Monica,CA,1988
  • 4Bass T,Gruber D.A glimpse into the future of id.http://www.usenix.org/publications /login/1999-9/features/future.html,1999
  • 5Bass T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99~105
  • 6Batsell S G,Rao N S,Shankar M.Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security.http://www.ioc.ornl.gov/projects/documents/containment.pdf,2005
  • 7Shifflet J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13~19
  • 8DeMontigny-Leboeuf A,Massicotte F.Passive network discovery for real time situation awareness.NATO/RTO Adaptive Defence in Unclassified Networks,Toulouse,France,April 2004
  • 9Yurcik W,et al.Two visual computer network security monitoring tools incorporating operator interface requirements.ACM CHI Workshop on Human-Computer Interaction and Security Systems(HCISEC),2003
  • 10Lau S.The spinning cube of potential doom.Communications of the ACM,2004,47(6):25~26

共引文献132

同被引文献12

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部