|
[1]
|
李伯虎, 张霖, 王时龙, 等. 云制造——面向服务的网络化制造新模式[J]. 计算机集成制造系统, 2010, 16(1): 1-7, 16.
|
|
[2]
|
Corallo, A., Lazoi, M., Lezzi, M. and Pontrandolfo, P. (2023) Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 70, 3745-3765. [Google Scholar] [CrossRef]
|
|
[3]
|
Li, J., Wu, Y., Li, Y., Zhang, Z., Fouad, H. and Altameem, T. (2023) A Network Security Prediction Method Based on Attack Defense Tree. Journal of Nanoelectronics and Optoelectronics, 18, 357-366. [Google Scholar] [CrossRef]
|
|
[4]
|
Wang, X., Li, S., Liu, M., Wang, Y. and Roy-Chowdhury, A.K. (2021) Multi-Expert Adversarial Attack Detection in Person Re-Identification Using Context Inconsistency. 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, 10-17 October 2021, 15077-15087. [Google Scholar] [CrossRef]
|
|
[5]
|
Zhao, D., Wang, H. and Wu, Y. (2022) Situation Element Extraction Based on Fuzzy Rough Set and Combination Classifier. Computational Intelligence and Neuroscience, 2022, Article ID: 3429227. [Google Scholar] [CrossRef] [PubMed]
|
|
[6]
|
Wang, H., Guo, W., Zhao, R., Zhou, B. and Hu, C. (2019) A Real-Time Online Security Situation Prediction Algorithm for Power Network Based on Adaboost and SVM. In: Yang, C.N., Peng, S.L. and Jain, L., Eds., Security with Intelligent Computing and Big-Data Service, Springer International Publishing, 526-534. [Google Scholar] [CrossRef]
|
|
[7]
|
Yin, K., Yang, Y., Yao, C. and Yang, J. (2022) Long-term Prediction of Network Security Situation through the Use of the Transformer-Based Model. IEEE Access, 10, 56145-56157. [Google Scholar] [CrossRef]
|
|
[8]
|
Cheng, M., Jia, G., Fang, W., Gao, Z. and Zhang, W. (2022) SSA and BPNN Based Efficient Situation Prediction Model for Cyber Security. 2022 18th International Conference on Mobility, Sensing and Networking (MSN), Guangzhou, 14-16 December 2022, 809-813. [Google Scholar] [CrossRef]
|
|
[9]
|
Chen, G. (2022) Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm. Computational Intelligence and Neuroscience, 2022, Article ID: 6314262. [Google Scholar] [CrossRef] [PubMed]
|
|
[10]
|
Ding, C., Chen, Y., Algarni, A.M., Zhang, G. and Peng, H. (2022) Application of Fractal Neural Network in Network Security Situation Awareness. Fractals, 30, Article ID: 2240090. [Google Scholar] [CrossRef]
|
|
[11]
|
Du, X., Ding, X. and Tao, F. (2023) Network Security Situation Prediction Based on Optimized Clock-Cycle Recurrent Neural Network for Sensor-Enabled Networks. Sensors, 23, Article 6087. [Google Scholar] [CrossRef] [PubMed]
|
|
[12]
|
Zhao, D., Shen, P. and Zeng, S. (2023) ALSNAP: Attention-Based Long and Short-Period Network Security Situation Prediction. Ad Hoc Networks, 150, Article ID: 103279. [Google Scholar] [CrossRef]
|
|
[13]
|
Xu, M., Liu, S. and Li, X. (2024) Network Security Situation Assessment and Prediction Method Based on Multimodal Transformation in Edge Computing. Computer Communications, 215, 103-111. [Google Scholar] [CrossRef]
|
|
[14]
|
Fan, S., Li, F., Wang, B., Zhang, X. and Yan, P. (2022) ELM Based Improved Layered Ensemble Architecture for Security Situation Prediction. 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Beijing, 3-5 October 2022, 630-634. [Google Scholar] [CrossRef]
|
|
[15]
|
Yang, H., Zhang, L., Zhang, X. and Zhang, J. (2021) An Adaptive IoT Network Security Situation Prediction Model. Mobile Networks and Applications, 27, 371-381. [Google Scholar] [CrossRef]
|
|
[16]
|
Xie, B., Zhao, G., Chao, M. and Wang, J. (2020) A Prediction Model of Cloud Security Situation Based on Evolutionary Functional Network. Peer-to-Peer Networking and Applications, 13, 1312-1326. [Google Scholar] [CrossRef]
|
|
[17]
|
Liu, D. (2020) Prediction of Network Security Based on DS Evidence Theory. ETRI Journal, 42, 799-804. [Google Scholar] [CrossRef]
|
|
[18]
|
Wang, Y., Yang, J., Xu, D. and Chin, K. (2006) The Evidential Reasoning Approach for Multiple Attribute Decision Analysis Using Interval Belief Degrees. European Journal of Operational Research, 175, 35-66. [Google Scholar] [CrossRef]
|
|
[19]
|
Yang, J.B., Liu, J., Wang, J., et al. (2006) Belief Rule-Base Inference Methodology Using the Evidential Reasoning Approach-rimer. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, 36, 266-285. [Google Scholar] [CrossRef]
|
|
[20]
|
Mirjalili, S. and Lewis, A. (2016) The Whale Optimization Algorithm. Advances in Engineering Software, 95, 51-67. [Google Scholar] [CrossRef]
|
|
[21]
|
Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N. and Hartog, F.T.H.D. (2022) ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets. IEEE Internet of Things Journal, 9, 485-496. [Google Scholar] [CrossRef]
|