赛博空间安全态势感知研究

61271252
2012
F0102.信息系统与系统安全
王东霞
面上项目
研究员
中国人民解放军军事科学院系统工程研究院
75万元
赛博空间安全;赛博空间;态势感知
2013-01-01到2016-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 Distributed State Monitoring for IaaS Cloud with Continuous Observation Sequence 会议论文 Bin Hong|Yazhou Hu|FuyangPeng|
2 CHoney: 一个面向 Cisco 路由器攻击捕获的新型蜜罐 期刊论文 彭飞|武东英|肖达|王东霞|
3 Implemention of Cyber Security Situation Based on Knowledge Discovery with Trusted Computer 会议论文 ZengJiemei|Fengxuewei|WangDongxia|FanLan|
4 一种基于马尔可夫性质的因果知识挖掘方法 期刊论文 冯学伟|王东霞|黄敏桓|李津|
5 BGK2015DX2007 奖励 王东霞|
6 An anomaly detection model for network intrusions using one-class SVM and scaling strategy 会议论文 Ming Zhang|BoyiXu|Dongxia Wang|
7 A Novel Method for Survivability Test Based on End Nodes in Large Scale Network 期刊论文 Ming Liang|Zhao Gang|Wang Dongxia|Huang Minhuan|
8 An Application of HVG Method to Studying Variations of LDoS Flow Packet Sequence Pattern 会议论文 ZhiJian Huang|Wei Peng|YongJun Wang|
9 云资源状态监控研究综述 期刊论文 洪斌|彭甫阳|邓波|王东霞|
10 云资源状态变化趋势预测研究进展 期刊论文 洪斌|彭甫阳|邓波|
11 IaaS云弹性测评技术研究 会议论文 胡亚洲|邓波|彭甫阳|
12 Dynamically Validate Network Security Based on Adaptive Control Theory 会议论文 FangLan|Wang Chunlei|MiaoQing|LiuLi|
13 Hardness Analysis and Empirical Studies of the Relations among Robustness, Topology and Flow in Dynamic Networks 期刊论文 Xing Zhou|Wei Peng|Zhen Xu|Bo Yang|
14 Multi-type clustering in heterogeneous information networks 期刊论文 Lin Wangqun|Yu Philip|
15 Mining Network Behavior Specifications of Malware Based on Binary Analysis 会议论文 Peidai Xie|Yongjun Wang|Huabiao Lu|
16 A Survey on Evaluating Elasticity of Cloud Computing Platform 会议论文 Bo Deng|Fuyang Peng|Yuchao Zhang|Dongxia Wang|
17 Elasticity Evaluation of IaaS Cloud Based on Mixed Workloads 会议论文 Yazhou Hu|Bo Deng|Yu Yang|Dongxia Wang|
18 用于木马流量检测的集成分类模型 期刊论文 兰景宏|刘胜利|吴双|
19 An Integrated Security Framework for SOA 会议论文 Lingxia Liu|Dongxia Wang|Minhuan Huang|Rui Zhang|
20 信息物理融合系统安全问题研究进展 期刊论文 彭昆仑|彭伟|王东霞|邢倩倩|
21 An effective approach on overlapping structures discovery for co-clustering 会议论文 Wangqun Lin|Yuchen Zhao|
22 Exploiting Historical Diffusion Data to Maximize Information Spread in Social Networks 期刊论文 Donghao Zhou|Wenbao Han|Yongjun Wang|
23 Autoscaling Prediction Models for Cloud Resource Provisioning 会议论文 Yazhou Hu|Bo Deng|Fuyang Peng|
24 DAC-Hmm: Detecting Anomaly in Cloud Systems with Hidden Markov Models 期刊论文 Bin Hong|Fuyang Peng|Bo Deng|
25 采用控制流监控的Cisco IOS指针攻击检测方法 期刊论文 刘胜利|邹睿|彭飞|
26 基于主题模型的网络异常行为分类学习方法研究 期刊论文 马征然|张博锋|王勇军|
27 A Network Gene-Based Framework for DetectingAdvanced Persistent Threats 会议论文 Yuan Wang|YongjunWang|Jing Liu|Zhijian Huang|
28 基于PCA降维的云资源状态监控数据压缩技术 期刊论文 邓波|彭甫阳|包阳|冯学伟|
29 基于信息熵的分布式拒绝服务攻击协同检测系统的设计与实现 期刊论文 宋洪涛|王小峰|王勇军|常帅|
30 Workload prediction for cloud computing elasticity mechanism 会议论文 Yazhou Hu|Bo Deng|Fuyang Peng|Dongxia Wang|
31 An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining 会议论文 Feng Xuewei|Wang Dongxia|Huang Minhuan|
32 PANP-GM A Periodic Adaptive Neighbor Workload Prediction Model Based on Grey Forecasting for Cloud Resource Provisioning 会议论文 Yazhou Hu|Bo Deng|Yu Yang|Dongxia Wang|
33 A Quantitative Survivability Test Method in the Large Scale Network Based on SD Pairs 会议论文 Ming Liang|Wang Dongxia|
34 Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm 会议论文 Liu Jing|Wang Yongjun|XiePeidai|Wang Yuan|
35 Empirical Study of Phase Transition of Hamiltonian Cycle Problem in Random Graphs with Degrees Greater Than One 会议论文 Wei Peng|Dongxia Wang|Xinwen Jiang|
36 Information diffusion network inferring and pathway tracking 期刊论文 ZHOU DongHao|HAN WenBao|WANG YongJun|YUAN BaoDi|
37 An abnormal file access behavior detection approach based on file path diversity 会议论文 Xiaobin Wang|Yongjun Wang|Yonglin Sun|
38 SA4WSs: A Security Architecture for Web Services 会议论文 Lingxia Liu|Dongxia Wang|Jinjing Zhao|Minhuan Huang|
查看更多信息请先登录或注册