Page 322 - 《软件学报》2021年第5期
P. 322
1546 Journal of Software 软件学报 Vol.32, No.5, May 2021
[68] Moreno MN, Segrera S, López VF, et al. Web mining based framework for solving usual problems in recommender systems. A
case study for movies’ recommendation. Neurocomputing, 2016,176:72−80.
[69] Zamani NA, Ariffin AFM, Abdullah SNHS. Recommender system based on empirical study of geolocated clustering and prediction
services for botnets cyber-intelligence in Malaysia. Int’l Journal of Advanced Computer Science and Applications, 2018,9(12):
473−478.
[70] Nash JF. Non-cooperative games. Annals of Mathematics, 1951,54:286−295.
[71] Roy S, Ellis C, Shiva S, et al. A survey of game theory as applied to network security. In: Proc. of the 2010 43rd Hawaii Int’l Conf.
on System Sciences. IEEE, 2010. 1−10.
[72] Liu P. A game theoretic approach to cyber attack prediction. Technology Report, No.DOE/ER/25527, University Park:
Pennsylvania State University, 2005.
[73] Hu H, Zhang H, Liu Y, et al. Quantitative method for network security situation based on attack prediction. Security and
Communication Networks, 2017,2017:1−19.
[74] Holgado P, Villagrá VA, Vazquez L. Real-time multistep attack prediction based on hidden Markov models. IEEE Trans. on
Dependable and Secure Computing, 2017,17(1):134−147. [doi: 10.1109/TDSC.2017.2751478]
[75] Husák M, Kašpar J. Towards predicting cyber attacks using information exchange and data mining. In: Proc. of the 2018 14th Int’l
Wireless Communications & Mobile Computing Conf. (IWCMC). IEEE, 2018. 536−541.
[76] Alneyadi S, Sithirasenan E, Muthukkumarasamy V. A survey on data leakage prevention systems. Journal of Network and
Computer Applications, 2016,62:137−152.
[77] Ji SL, Du TY, Li JF, Shen C, Li B. Security and privacy of machine learning models: A survey. Ruan Jian Xue Bao/Journal of
Software, 2021,32(1):41−67 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6131.htm [doi: 10.13328/j.cnki.
jos.006131]
附中文参考文献:
[17] 易平,王科迪,黄程,等.人工智能对抗攻击研究综述.上海交通大学学报,2018,52(10):172−180.
[31] 孟锦.网络安全态势评估与预测关键技术研究[博士学位论文].南京:南京理工大学,2012.
[32] 陈灿,阎保平.针对复合攻击的网络攻击预测算法.计算机工程,2011,37(5):172−174,178.
[77] 纪守领,杜天宇,李进锋,沈超,李博.机器学习模型安全与隐私研究综述.软件学报,2021,32(1):41−67. http://www.jos.org.cn/1000-
9825/6131.htm [doi: 10.13328/j.cnki.jos.006131]
马钰锡(1995-),男,博士生,主要研究领域 谭毓安(1972-),男,博士,教授,博士生导
为人工智能,强化学习,存储保护. 师,CCF 高级会员,主要研究领域为深度学
习及对抗,物联网与嵌入式系统,数据存储
安全,Android 安全.
张全新(1974-),男,博士,副教授,主要研 沈蒙(1988-),男,博士,副教授,博士生导
究领域为人工智能,深度学习,信息安全. 师,CCF 专业会员,主要研究领域为数据安
全与隐私保护,人工智能安全.