1. Y. Lin, C. Wang, C. G. Ma, Z. Dou,X. F. Ma, “A New Combination Method for Multisensor Conflict Information,” The Journal of Supercomputing, Vol. 72, No.7, pp. 2874-2890, 2016 2. Y. Tu, Y. Lin, J. Wang,J. U. Kim, “Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification,” CMC-Computers Materials and Continua, Vol. 55, No. 2, pp. 243-254, 2019 3. H. Wang, Z. F. Chen, X. Feng, X. Q. Di, D. Liu, J. P. Zhao, et al., “Research on Network Security Situation Assessment and Quantification Method based on Analytic Hierarchy Process,” Wireless Personal Communications, Vol. 102, No. 2, pp. 1401-1420, 2018 4. E. Ramasso and T. Denoeux, “Making Use of Partial Knowledge about Hidden States in HMMS: An Approach based on Belief Functions,” IEEE Transactions on Fuzzy System, Vol. 22, No. 2, pp. 395-405, 2014 5. X. Y. Zhu, “Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory,” International Journal of Security and its Applications, Vol. 10, No. 12, pp. 359-368, 2016 6. Y. X. Luo, M. H. Zhao, Q. Y. Zhang,A. J. Zou, “Network Security Situation Awareness Model-Inspired by Immune,”Advanced Materials Research, Vol. 267, pp. 635-638, 2011 7. R. Z.Fan and M. K. Zhou, “Network Security Awareness and Tracking Method by GT,” Journal of Computational Information Systems, Vol. 9, No. 3, pp. 1043-1050, 2013 8. H. Wang, Z. F. Chen, J. P. Zhao, X. Q. Di,D. Liu, “A Vulnerability Assessment Method in Industrial Internet of Things based on Attack Graph and Maximum Flow,”IEEE Access, Vol. 6, pp. 8599-8609, 2018 9. X. Z. Wang, “Network Information Security Situation Assessment based on Bayesian Network,”International Journal of Security and its Applications, Vol. 5, pp. 129-138, 2016 10. Y. Wang, “Research on Network Security Situation Prediction based on Markov Game Theory,”International Journal of Security and its Applications, Vol. 9, pp. 301-308, 2016 11. K. Wu and Z. Y. Bai, “Trusted Network Security Situational Awareness and Forecast based on SPA,” Journal of Harbin Institute of Technology, Vol. 44, No. 3, pp. 112-118, 2012 12. S. Y.Wu and X. G. Tian, “Method for Anomaly Detection of User Behaviors based on Hidden Markov Models,” Journal on Communications, Vol. 28, No. 4, pp. 38-43, 2007 |