3BASS T. Intrusion detection systems and multi-sensor data fusion: creating cyberspace situation awareness[J]. Communications of the ACM, 2000, 43(4): 99-105.
4BASS T, ROBICHAUX R. Defense-in-depth revisited: qualitative risk analysis methodology for complex network- centric operations[C]//Proceedings of the IEEE Military Communications Conference. McLean:IEEE Press, 2001: 64-70.
5CHEN X Z, ZHENG Q H, GUAN X H, et al. Multiple behavior information fusion based quantitative threat evaluation[J]. Computer & Security, 2005, 24(3): 218-231.
6NING P, CUI Y, REEVES D S, et al. Techniques and tools for analyzing intrusion alerts[J]. ACM Transaction on Information and System Security, 2004, 7(2): 274-318.
7MATHEW S, SHAH C, UPADHYAYA S. An alert fusion framework for situation awareness of coordinated multistage attacks[C]//Proceedings of Third IEEE International Workshop on Information Assurance. College Park, Maryland: IEEE Press, 2005: 95-104.
8BEARAVOLU R, LAKKARAJU K, YURCIK W, et al. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks[C]//Proceedings of the 2003 IEEE Military Communications Conference. Monterey, CA: IEEE, 2003: 850-855.
9YIN X X, YURCIK W, SLAGELL A. The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness[C]//Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA' 05). College Park, Maryland: IEEE, 2005: 141-153.
10Bass T.Intrusion Detection System and Multisensor Data Fusion[J].Communications of the ACM,2000,43(4):99-105