网络安全评估与分析模型研究

刘文彦, 霍树民, 仝青, 张淼, 齐超 - 网络与信息安全学报, 2018 - infocomm-journal.com
system clearly, and gives corresponding security suggestions and countermeasures. Model
of network security assessment … no review to give a comprehensive summary or analysis. A …

[PDF][PDF] 高安全等级系统抗攻击能力测评研究

蒋建春, 文伟平, 胡陈勇 - 信息安全研究, 2022 - pkuexploit.com
security evaluation,and the evaluation work is limited to static … of threat capability model are
presented,and the model is … 的安全信 息事件与管理系统(SIEM)或态势感知系统可以 快速将威胁…

电力监控系统网络安全管理平台端点Agent 体系架构及关键技术

马骁, 崔旭东, 李勃, 高明慧, 马力, 赵航 - 现代电力, 2023 - xddl.ncepujournal.com
… (security information and event management, SIEM)[11],但其对未知威胁攻击检测和响应 能力
偏弱,已经不能满足电力系统网络安全的需 要,亟需改进.在SIEMsecurity architecture model for …

基于博弈模型与NetLogo 仿真的网络攻防态势研究

刘小虎, 张恒巍, 张玉臣, 马壮, 吕文雷 - 系统仿真学报, 2020 - china-simulation.com
… on models of network security evaluation and analysis[J]. Chinese Journal of Network and
Information Security, … A novel kill-chain framework for remote security log analysis with SIEM

[PDF][PDF] 电力系统安全仿真技术: 工程安全, 网络安全与信息物理综合安全

王子骏, 刘杨, 鲍远义, 管晓宏, 吴桐… - SCIENCE CHINA …, 2017 - researchgate.net
system security simulation technologies: engineering safety, network security and cyber-physical
integrated securitysystem cyber-physical integrated security simulation technologies …

[HTML][HTML] 基于大数据的网络安全与情报分析

陈兴蜀, 曾雪梅, 王文贤, 邵国林 - 2017 - jsuese.cnjournals.com
… Ban公司在Hadoop系统上使用Hive查询大幅提高传统SIEM工具海量数据检索时间,从原来的20
min~… Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. …

[HTML][HTML] 视频内容安全评价发展探讨

吴晨思, 蔡茂滨, 杨耀淳, 赵晓莺, 范科峰 - 2022 - cjig.cn
… overall security evaluation framework, a security evaluation … analysis of SIEM rules for real
time network security monitoring… Survivability evaluation index systems and evaluation models

[HTML][HTML] 生成对抗网络驱动的图像隐写与水印模型

郑钢, 胡东辉, 戈辉, 郑淑丽 - 2021 - cjig.cn
… Compared with the state-of-the-art deep learning-based watermarking methods, when
resisting various types and high-intensity noise attacks, IRBW-GAN model considerably …

企業資訊安全營運管理之績效評估

黃瓊瑩 - 2011 - tdr.lib.ntu.edu.tw
… Enterprise should exercise due care to perform the ongoing maintenance necessary to keep
IT systems in proper working order, or to abide by what is commonly expected in a situation. …

[PDF][PDF] 多级分布式应急响应处理研究

单智勇 - researchgate.net
… protection system. In this paper we propose work flow model, data model, organization
model and procedure model for distributed and hierarchical urgent security events handling …