Page 79 - 《软件学报》2021年第7期
P. 79
王璐 等:基于事件关系保障识别质量的自适应分析方法 1997
[24] Ju AK, Guo YB, Zhu TM, Wang T. Survey on network security event correlation analysis methods and tools. Computer Science,
2017,44(2):38–45 (in Chinese with English abstract).
[25] Jing L, Gu L, Xu GS, Niu XX. A correlation analysis method of network security events based on rough set theory. In: Proc. of the
Int’l Conf. on Network Infrastructure & Digital Content. IEEE, 2013. 517–520. [doi: 10.1109/ICNIDC.2012.6418807]
[26] Zhu B, Ghorbani AA. Alert correlation for extracting attack strategies. Int’l Journal of Network Security, 2006,3(3):244–258.
[27] Massie ML, Chun BN, Culler DE. The ganglia distributed monitoring system: Design, implementation, and experience. Parallel
Computing, 2004,30(7):817–840. [doi: 10.1016/j.parco.2004.04.001]
[28] Wang JM, Wu JH. Research on performance automation testing technology based on JMeter. In: Proc. of the 2019 Int’l Conf. on
Robots & Intelligent System (ICRIS 2019). IEEE, 2019. 55–58. [doi: 10.1109/ICRIS.2019.00023]
[29] Povedano-Molina J, Lopez-Vega JM, Lopez-Soler JM, Corradi A, Foschini L. DARGOS: A highly adaptable and scalable
monitoring architecture for multi-tenant Clouds. Future Generation Computer Systems, 2013,29(8):2041–2056. [doi: 10.1016/j.
future.2013.04.022]
[30] Han DS, Xing JC, Yang QL, LI JL. Modeling and verification approach for temporal properties of self-adaptive software dynamic
processes. Journal of Computer Applications, 2018(3):799–805 (in Chinese with English abstract).
[31] Xu LK, Li JL, Zhu Z, Chen HP, Wang L. Research on pattern mining of alarm sequence based on network and time constraints.
Computer & Digital Engineering, 2019,47(9):2364–2368 (in Chinese with English abstract).
[32] Hamza Z, Abdallah T. Mapping fault tree into Bayesian network in safety analysis of process system. In: Proc. of the 4th Int’l Conf.
on Electrical Engineering (ICEE 2015). IEEE, 2015. 1–5.
[33] Trihinas D, Pallis G, Dikaiakos M. Monitoring elastically adaptive multi-cloud services. IEEE Trans. on Cloud Computing, 2015,
6(3):1. [doi: 10.1109/TCC.2015.2511760]
[34] Ge JW, Zhang B, Fang YQ. Study on resource monitoring model in cloud computing environment. Computer Engineering, 2011,
37(11):31–33 (in Chinese with English abstract). [doi: 10.3969/j.issn.1000-3428.2011.11.011]
[35] Zhang X, Ying S, Zhang T. Collection and service processing framework of application running log. Computer Engineering and
Applications, 2018,54(10):81–89,142 (in Chinese with English abstract).
[36] Wang R, Ying S, Sun CG, Wan HY, Zhang HL, Jia XY. Model construction and data management of running log in supporting
SAAS software performance analysis. In: Proc. of the 29th Int’l Conf. on Software Engineering and Knowledge Engineering. 2017.
149–154. [doi: 10.18293/SEKE2017-128]
[37] Wang L. Software adaptation mechanism based on multi-agent theory and parallel search [Ph.D. Thesis]. Xi’an: University of
Xidian, 2019 (in Chinese with English abstract).
[38] Zhang H, Li QS, Wang L, Cheng W. Self-adaptive software changes analysis method based on “Detection-Recognition” mechanism.
In: Proc. of the 31st Int’l Conf. on Software Engineering & Knowledge Engineering (SEKE 2019). 2019. 287–290. [doi: 10.18293/
SEKE2019-049]
附中文参考文献:
[7] 王子勇,王焘,张文博,陈宁江,左春.一种基于执行轨迹监测的微服务故障诊断方法.软件学报,2017,28(6):1435–1454. http://www.
jos.org.cn/1000-9825/5223.htm [doi: 10.13328/j.cnki.jos.005223]
[14] 王焘,张文博,徐继伟,魏峻,钟华.云环境下基于统计监测的分布式软件系统故障检测技术研究.计算机学报,2017,40(2):397–413.
[16] 陈慧星,任艳,俞少行.运载火箭常规燃料调温系统模糊故障树研究.宇航学报,2017,38(1):104–108.
[19] 李正芳,庞海杰.基于改进遗传算法的网络故障数据实时检测系统研究.现代电子技术,2018,41(13):138141,146. [doi: 10.16652/
j.issn.1004-373x.2018.13. 031]
[20] 曲朝阳,刘晓庆,辛鹏.基于 Hadoop 的变电站设备故障状态识别与预测模型.软件导刊,2015(3):61–63.
[22] 杨艳燕.云计算中基于相似性图的故障自动诊断方法.计算机测量与控制,2014,22(12):3877–3880.
[24] 琚安康,郭渊博,朱泰铭,王通.网络安全事件关联分析技术与工具研究.计算机科学,2017,44(2):38–45.
[30] 韩德帅,邢建春,杨启亮,李决龙.自适应软件动态过程时间特性建模与验证方法.计算机应用,2018(3):799–805.
[31] 徐立坤,李建路,朱珠,陈海平,王林.基于网络和时间约束的告警序列模式挖掘研究.计算机与数字工程,2019,47(9):2364–2368.
[34] 葛君伟,张博,方义秋.云计算环境下的资源监测模型研究.计算机工程,2011,37(11):31–33.