[1] 路云飞, 李琳琳, 张壮, 等. 新一代指挥控制系统信息化能力分析与评估[J]. 计算机科学, 2018, 45(11A): 549-552. LU Y F, LI L L, ZHANG Z, et al. Information capability analysis and evaluation of new generation command and control system computer engineering and applications[J]. Computer Science, 2018, 45(11A): 549-552. (in Chinese) [2] 徐志伟, 曾琛, 朝鲁, 等. 面向控域的体系结构:一种智能万物互联的体系结构风格[J]. 计算机研究与发展, 2019, 56(1): 94-106. XU Z W, ZENG C, CHAO L, et al. Zone-oriented architecture: an architectural style for smart web of everything[J]. Journal of Computer Research and Development, 2019, 56(1): 94-106. (in Chinese) [3] 柏晓辉, 柏晓莉, 易先清. 面向服务的C4ISR系统仿真应用集成研究[J]. 系统工程与电子技术, 2010, 32(4): 784-790. BAI X H, BAI X L, YI X Q. Study on service-oriented C4ISR simulation application integration[J]. Systems Engineering and Electronics, 2010, 32(4): 784-790. (in Chinese) [4] 曾艳阳, 康凤举, 张建春. 一种基于SOA的指控仿真系统的分层体系结构[J]. 系统仿真学报, 2011, 23(8): 1714-1718. ZENG Y Y, KANG F J, ZHANG J C. Layered command and control simulation system architecture based on SOA[J]. Journal of System Simulation, 2011, 23(8): 1714-1718. (in Chinese) [5] 陈志锋, 李清宝, 张平, 等. 面向Linux的内核级代码复用攻击检测技术[J]. 软件学报, 2017, 28(7): 1732-1745. CHEN Z F, LI Q B, ZHANG P, et al. Kernel code reuse attack detection technique for Linux[J]. Journal of Software, 2017, 28(7): 1732-1745. (in Chinese) [6] 谢柏林, 余顺争. 基于应用层协议分析的应用层实时主动防御系统[J]. 计算机学报, 2011, 34(3): 452-463. XIE B L, YU S Z. Application layer real-time proactive defense system based on application layer protocol analysis[J]. Chinese Journal of Computers, 2011, 34(3): 452-463. (in Chinese) [7] 钱亚冠, 卢红波, 纪守领, 等. 一种针对基于SVM入侵检测系统的毒性攻击方法[J]. 电子学报, 2019, 47(1):59-65. QIAN Y G, LU H B, JI S L, et al. A poisoning attack on intrusion detection system based on SVM[J]. Acta Electronica Sinica, 2019, 47(1): 59-65. (in Chinese) [8] ZHANG X, ZHANG X, QI Y, et al. Security evaluation for wireless sensor networks based on attack test and fuzzy comprehensive judgement[J]. Lecture Notes in Electrical Engineering, 2014, 295: 81-92. [9] 金菊良, 魏一鸣, 丁晶. 基于改进层次分析法的模糊综合评价模型[J]. 水利学报, 2004, 35(3): 65-70. JIN J L, WEI Y M, DING J. Fuzzy comprehensive evaluation model based on improved analytic hierarchy process[J]. Journal of Hydraulic Engineering, 2004, 35(3): 65-70. (in Chinese)
[10] 王会梅, 江亮, 鲜明, 等. 计算机网络攻击效果灰色评估模型和算法[J]. 通信学报, 2009, 30(11A): 17-22. WANG H M, JIANG L, XIAN M. Grey evaluation model and algorithm of network attack effectiveness[J]. Journal on Communications, 2009, 30(11A): 17-22. (in Chinese) [11] 黄亮, 冯登国, 连一峰, 等. 一种基于多属性决策的DDoS防护措施遴选方法[J]. 软件学报, 2015, 26(7): 1742-1756. HUANG L, FENG D G, LIAN Y F, et al. Method of DDoS countermeasure selection based on multi-attribute decision making[J]. Journal of Software, 2015, 26(7): 1742-1756. (in Chinese) [12] 黄亮, 冯登国, 连一峰, 等. 基于神经网络的DDoS防护绩效评估[J]. 计算机研究与发展, 2013, 50(10): 2100-2108. HUANG L, FENG D G, LIAN Y F, et al. Artificial-neural-network-based DDoS defense effectiveness evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108. (in Chinese) [13] CHO J, LEE J. Development of a new technology product evaluation model for assessing commercialization opportunities using Delphi method and fuzzy AHP approach[J]. Expert Systems with Applications, 2013, 40(13):5314-5330. [14] METIN D, I·HSAN Y. Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management[J]. Information Sciences, 2008, 178(6): 1717-1733. [15] 吕跃进. 基于模糊一致矩阵的模糊层次分析法的排序[J]. 模糊系统与数学, 2002, 16(2): 79-85. L Y J. Weight calculation method of fuzzy analytical hierarchy process[J]. Fuzzy Systems and Mathematics, 2002, 16(2): 79- 85. (in Chinese) [16] 李雄伟, 于明, 杨义先, 等. Fuzzy-AHP法在网络攻击效果评估中的应用[J]. 北京邮电大学学报, 2006, 29(1): 124-127. LI X W, YU M, YANG Y X, et al. Application of fuzzy-AHP method in the effect evaluation of network attack[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 124-127. (in Chinese) [17] 田钦谟. 模糊综合评价中的若干问题[J]. 模糊系统与数学, 1996(2): 62-69. TIAN Q M. Several problems in fuzzy comprehensive evaluation[J]. Fuzzy Systems and Mathematics, 1996(2): 62-69. (in Chinese) [18] 郭严赞,季新生,刘彩霞,等. 一种基于模糊综合评价的IMS网络攻击后果评估方法[J]. 计算机应用研究,2013,30(11): 3400-3403,3406. GUO Y Z, JI X S, LIU C X, et al. Evaluation method for IMS network attack effect based on fuzzy comprehensive evaluation[J]. Application Research of Computers, 2013, 30(11): 3400-3403,3406. (in Chinese)
[19] DING S, SU C, YU J. An optimizing BP neural network algorithm based on genetic algorithm[J]. Artificial Intelligence Review, 2011, 36(2): 153-162. [20] 冯永新, 赵运弢, 苏广楠, 等. 一种SOAP泛洪攻击效能模糊评估方法[J]. 兵工学报, 2015, 36(11): 2203-2208. FENG Y X, ZHAO Y T, SU G N, et al. A fuzzy efficiency eva-luation method for soap flooding attack[J]. Acta Armamentarii, 2015, 36(11): 2203-2208. (in Chinese) [21] 常帅, 孙一品, 王勇军, 等. 网络攻击源威胁行为评估方法研究[J]. 小型微型计算机系统, 2015, 36(1): 121-125. CHANG S,SUN Y P,WANG Y J, et al. Study of evaluation method for the threatening behavior of network attacker[J]. Journal of Chinese Computer Systems, 2015, 36(1): 121-125. (in Chinese)
第41卷第5期2020 年5月 兵工学报ACTA ARMAMENTARII Vol.41No.5May2020
|