Page 322 - 《软件学报》2021年第5期
P. 322

1546                                     Journal of Software  软件学报 Vol.32, No.5,  May 2021

                [68]    Moreno MN, Segrera S, López VF, et al. Web mining based framework for solving usual problems in recommender systems. A
                     case study for movies’ recommendation. Neurocomputing, 2016,176:72−80.
                [69]    Zamani NA, Ariffin AFM, Abdullah SNHS. Recommender system based on empirical study of geolocated clustering and prediction
                     services for botnets  cyber-intelligence in  Malaysia. Int’l Journal of Advanced  Computer Science  and  Applications, 2018,9(12):
                     473−478.
                [70]    Nash JF. Non-cooperative games. Annals of Mathematics, 1951,54:286−295.
                [71]    Roy S, Ellis C, Shiva S, et al. A survey of game theory as applied to network security. In: Proc. of the 2010 43rd Hawaii Int’l Conf.
                     on System Sciences. IEEE, 2010. 1−10.
                [72]    Liu  P.  A  game  theoretic approach  to cyber attack  prediction. Technology Report, No.DOE/ER/25527, University  Park:
                     Pennsylvania State University, 2005.
                [73]    Hu H, Zhang H, Liu Y,  et  al. Quantitative method for  network security  situation  based on attack  prediction.  Security and
                     Communication Networks, 2017,2017:1−19.
                [74]    Holgado  P, Villagrá VA, Vazquez L. Real-time multistep attack  prediction  based  on  hidden Markov models.  IEEE Trans.  on
                     Dependable and Secure Computing, 2017,17(1):134−147. [doi: 10.1109/TDSC.2017.2751478]
                [75]    Husák M, Kašpar J. Towards predicting cyber attacks using information exchange and data mining. In: Proc. of the 2018 14th Int’l
                     Wireless Communications & Mobile Computing Conf. (IWCMC). IEEE, 2018. 536−541.
                [76]    Alneyadi S, Sithirasenan  E,  Muthukkumarasamy  V.  A survey  on data leakage prevention systems.  Journal of  Network  and
                     Computer Applications, 2016,62:137−152.
                [77]    Ji SL, Du TY, Li JF, Shen C, Li B. Security and privacy of machine learning models: A survey. Ruan Jian Xue Bao/Journal of
                     Software, 2021,32(1):41−67 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6131.htm [doi: 10.13328/j.cnki.
                     jos.006131]
                 附中文参考文献:
                 [17]  易平,王科迪,黄程,等.人工智能对抗攻击研究综述.上海交通大学学报,2018,52(10):172−180.
                 [31]  孟锦.网络安全态势评估与预测关键技术研究[博士学位论文].南京:南京理工大学,2012.
                 [32]  陈灿,阎保平.针对复合攻击的网络攻击预测算法.计算机工程,2011,37(5):172−174,178.
                 [77]  纪守领,杜天宇,李进锋,沈超,李博.机器学习模型安全与隐私研究综述.软件学报,2021,32(1):41−67. http://www.jos.org.cn/1000-
                     9825/6131.htm [doi: 10.13328/j.cnki.jos.006131]



                              马钰锡(1995-),男,博士生,主要研究领域                      谭毓安(1972-),男,博士,教授,博士生导
                              为人工智能,强化学习,存储保护.                             师,CCF 高级会员,主要研究领域为深度学
                                                                           习及对抗,物联网与嵌入式系统,数据存储
                                                                           安全,Android 安全.

                              张全新(1974-),男,博士,副教授,主要研                      沈蒙(1988-),男,博士,副教授,博士生导
                              究领域为人工智能,深度学习,信息安全.                          师,CCF 专业会员,主要研究领域为数据安
                                                                           全与隐私保护,人工智能安全.
   317   318   319   320   321   322   323   324   325   326   327