[1]
Bass T. Multi-Sensor Data Fusion for next Generation Distributed Intrusion Detection Systems [C]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel, USA, 1999(1): 24-27.
Google Scholar
[2]
Bass T. Intrusion Detection Systems and Multi-Sensor Data Fusion: Creating Cyberspace Situation Awareness [J]. Communications of the ACM, 2000, 43(4): 99-105.
Google Scholar
[3]
Feng Xuewei, Wang Dongxia. A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment. 2011 International workshop on Frontiers of Secure Networks.
DOI: 10.1109/imis.2011.43
Google Scholar
[4]
Wang Huiqiang, Lai Jibao, Hu Mingming. Research on the key implement technology of network security situation awareness[J]. Geomatics and Information Science of Wuhan University. 2008, Vol. 33 No. 10 (in Chinese).
Google Scholar
[5]
Wang Yanbo, Wang Huiqiang, Wang Xiufeng, Yu Ming. Design of multi-source and heterogeneous log sensor for network situational awareness. Transducer and Microsystem Technologies. 2010. Vol. 29 No. 3 (in Chinese).
DOI: 10.1109/iccsit.2010.5564777
Google Scholar
[6]
Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development. 2009. 46(10): 1669-1677 (in Chinese).
Google Scholar
[7]
Feng Xuewei, Wang Dongxia. Analyzing and Correlating Security Events Using State Machine. 2010 International workshop on Frontiers of Secure Networks.
DOI: 10.1109/cit.2010.476
Google Scholar
[8]
Liu Nian, Liu Sunjun, Liu Yong, Zhao Hui. Method of Network Security Situation Awareness Based on Artificial Immunity System[J]. Computer Science. 2010. Vol. 37 No. 1 (in Chinese).
Google Scholar
[9]
Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams[C] /Knowledge-Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer,2004:1136-1142.
DOI: 10.1007/978-3-540-30132-5_154
Google Scholar
[10]
Chen Xiuzhen,Zhen Qinghua,Guan Xiaohong,et al. Quantitative hierarchical threat evaluation model for network security[J]. Jouranl of Software,2006,17(4):885-897 (in Chinese).
Google Scholar
[11]
Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situation awareness [C/OL] /Pro of ACM/ USENIX Hotnets IV. 2005[2008-01-12]. http: /www. icir. org/vern/papers/sit-aware-hotnet05. pdf.
Google Scholar
[12]
GENSHE CHEN DAN SHEN CHIMAN KWAN . Game Theoretic Approach to Threat Prediction and Situation Awareness. JOURNAL OF ADVANCES IN INFORMATION FUSION VOL. 2, NO. 1 JUNE (2007).
DOI: 10.1109/icif.2006.301670
Google Scholar
[13]
Zhang Yong, Network Security Situation Awareness Model Research and System Implementation. A dissertation for doctor' s degree. University of Science and Technology of China. 2010. 5.
Google Scholar