[1]
Chen XZ etc., Quantitative hierarchical threat evaluation model for network security, Journal of Software, 2006, 17(4): pp.885-897.
Google Scholar
[2]
Wei Hu etc., A Novel Approach to Cyberspace Security Situation Based on the Vulnerabilities Analysis, in Proceedings of the 6th World Congress on Intelligent Control and Automation, June 21 - 23, (2006).
DOI: 10.1109/wcica.2006.1713284
Google Scholar
[3]
Lau S. The spinning cube of potential doom. Communications of the ACM, 2004, 47(6): 25-26.
DOI: 10.1145/990680.990699
Google Scholar
[4]
Kiran Lakkaraju, W. Yurcik, Adam J Lee. NVisionIP: netflow visualizations of system state for security situational awareness, in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004: pp.65-72.
DOI: 10.1145/1029208.1029219
Google Scholar
[5]
T. Bass, Intrusion Detection Systems and Multisensor Data Fusion: Creating Cyberspace Situational Awareness. Communications of the ACM, 1999. 43(4): pp.99-105.
DOI: 10.1145/332051.332079
Google Scholar
[6]
Jianyi Zhang, etc., A Real-time Automatic Detection of Phishing URLs. in Proceedings of Computer Science and Network Technology, 2012. pp.1212-1216.
Google Scholar
[7]
Rasmussen, R. and G. Aaron (Nov 2011) Global Phishing Survey 1H2011. Anti-Phishing Working Group.
Google Scholar
[8]
Garera, S., N. Provos, M. Chew, and A.D. Rubin. A Framework for Detection and Measurement of Phishing Attacks, in Proceedings of the 2007 ACM Workshop On Recurring Malcode, Alexandria, Virginia, USA, ACM, pp.1-8, (2007).
DOI: 10.1145/1314389.1314391
Google Scholar
[9]
Yuan, G.X., C.H. Ho, and C.J. Lin. An Improved GLMNET for L1-regularized Logistic Regression, in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2011).
DOI: 10.1145/2020408.2020421
Google Scholar