[1]
T Bass, D Gruber; A Glimpse into the Future of ID [EB/OL]. (1999- 09).
Google Scholar
[2006]
http: /www. usenix. org/publications/login/1999- 9/features/future. html.
Google Scholar
[2]
T Bass; Intrusion detection systems and multi-sensor data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105.
Google Scholar
[3]
Wang Huiqiang, Lai Jibao, Zhu Liang, Liang Ying; Survey of Network Situation Awareness System[J]; Journal of Computer Science , 2006, 33(10): 5-10.
DOI: 10.1109/iscis.2007.4456876
Google Scholar
[4]
Liu Lei, Wang Huiqiang, Liang Ying; Evaluation method of service level network security situation based on fuzzy analytic hierarchy process[J]; Journal of Computer Applications, 2009, 29(9): 2327-2331, 2335.
DOI: 10.3724/sp.j.1087.2009.02327
Google Scholar
[5]
Lai Jibao, Wang Huiqiang, Jin Shuang; Study of network security situation awareness system based on net flow; Application Research of Computers[J] 2007, 24(8): 167-169, 172.
Google Scholar
[6]
Liang Ying, Wang Huiqiang, Lai Jibao; A Method of Network Security Situation Awareness Based on Rough Set Theory[J]; Journal of Computer Science; 2007, 34(8): 95-97, 147.
DOI: 10.1109/iscis.2007.4456876
Google Scholar
[7]
Lai Jibao Wang Huiqiang Zhu Liang; Research on Network Security Situation Awareness Model[J]; Journal of Computer Research and Development, 2006 43(z2).
DOI: 10.1109/iscis.2007.4456876
Google Scholar
[8]
Zhao Guosheng, Wang Huiqiang, Wang Jian; A situation awareness model of network security based on grey Verhulst model[J]; Journal of Harbin Institute of Technology, 2008, 40(5).
Google Scholar
[9]
Y Livnat, J Agutter, S Moon, S Foresti; Visual correlation for situational awareness[J]; IEEE Symposium on Information Visualization 2005: 95- 102.
DOI: 10.1109/infvis.2005.1532134
Google Scholar
[10]
Lakkaraju K, et al. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness. In: ACM CCS Workshop on Visualization and Data Mining for Computer Security(VizSEC/DMSEC)held in conjunction with the 11th ACM Conference on Computer and Communications Security, (2004).
DOI: 10.1145/1029208.1029219
Google Scholar