Page 79 - 《软件学报》2021年第7期
P. 79

王璐  等:基于事件关系保障识别质量的自适应分析方法                                                      1997


                [24]    Ju AK, Guo YB, Zhu TM, Wang T. Survey on network security event correlation analysis methods and tools. Computer Science,
                     2017,44(2):38–45 (in Chinese with English abstract).
                [25]    Jing L, Gu L, Xu GS, Niu XX. A correlation analysis method of network security events based on rough set theory. In: Proc. of the
                     Int’l Conf. on Network Infrastructure & Digital Content. IEEE, 2013. 517–520. [doi: 10.1109/ICNIDC.2012.6418807]
                [26]    Zhu B, Ghorbani AA. Alert correlation for extracting attack strategies. Int’l Journal of Network Security, 2006,3(3):244–258.
                [27]    Massie ML, Chun BN, Culler DE. The ganglia distributed monitoring system: Design, implementation, and experience. Parallel
                     Computing, 2004,30(7):817–840. [doi: 10.1016/j.parco.2004.04.001]
                [28]    Wang JM, Wu JH. Research on performance automation testing technology based on JMeter. In: Proc. of the 2019 Int’l Conf. on
                     Robots & Intelligent System (ICRIS 2019). IEEE, 2019. 55–58. [doi: 10.1109/ICRIS.2019.00023]
                [29]    Povedano-Molina J, Lopez-Vega  JM, Lopez-Soler  JM,  Corradi A,  Foschini L. DARGOS:  A  highly adaptable and scalable
                     monitoring architecture  for multi-tenant Clouds.  Future Generation Computer  Systems,  2013,29(8):2041–2056. [doi: 10.1016/j.
                     future.2013.04.022]
                [30]    Han DS, Xing JC, Yang QL, LI JL. Modeling and verification approach for temporal properties of self-adaptive software dynamic
                     processes. Journal of Computer Applications, 2018(3):799–805 (in Chinese with English abstract).
                [31]    Xu LK, Li JL, Zhu Z, Chen HP, Wang L. Research on pattern mining of alarm sequence based on network and time constraints.
                     Computer & Digital Engineering, 2019,47(9):2364–2368 (in Chinese with English abstract).
                [32]    Hamza Z, Abdallah T. Mapping fault tree into Bayesian network in safety analysis of process system. In: Proc. of the 4th Int’l Conf.
                     on Electrical Engineering (ICEE 2015). IEEE, 2015. 1–5.
                [33]    Trihinas D, Pallis G, Dikaiakos M. Monitoring elastically adaptive multi-cloud services. IEEE Trans. on Cloud Computing, 2015,
                     6(3):1. [doi: 10.1109/TCC.2015.2511760]
                [34]    Ge JW, Zhang B, Fang YQ. Study on resource monitoring model in cloud computing environment. Computer Engineering, 2011,
                     37(11):31–33 (in Chinese with English abstract). [doi: 10.3969/j.issn.1000-3428.2011.11.011]
                [35]    Zhang X, Ying S, Zhang T. Collection and service processing framework of application running log. Computer Engineering and
                     Applications, 2018,54(10):81–89,142 (in Chinese with English abstract).
                [36]    Wang R, Ying S, Sun CG, Wan HY, Zhang HL, Jia XY. Model construction and data management of running log in supporting
                     SAAS software performance analysis. In: Proc. of the 29th Int’l Conf. on Software Engineering and Knowledge Engineering. 2017.
                     149–154. [doi: 10.18293/SEKE2017-128]
                [37]    Wang  L. Software adaptation  mechanism based on  multi-agent  theory  and parallel search [Ph.D. Thesis].  Xi’an: University of
                     Xidian, 2019 (in Chinese with English abstract).
                [38]    Zhang H, Li QS, Wang L, Cheng W. Self-adaptive software changes analysis method based on “Detection-Recognition” mechanism.
                     In: Proc. of the 31st Int’l Conf. on Software Engineering & Knowledge Engineering (SEKE 2019). 2019. 287–290. [doi: 10.18293/
                     SEKE2019-049]

                 附中文参考文献:
                  [7]  王子勇,王焘,张文博,陈宁江,左春.一种基于执行轨迹监测的微服务故障诊断方法.软件学报,2017,28(6):1435–1454. http://www.
                     jos.org.cn/1000-9825/5223.htm [doi: 10.13328/j.cnki.jos.005223]
                 [14]  王焘,张文博,徐继伟,魏峻,钟华.云环境下基于统计监测的分布式软件系统故障检测技术研究.计算机学报,2017,40(2):397–413.
                 [16]  陈慧星,任艳,俞少行.运载火箭常规燃料调温系统模糊故障树研究.宇航学报,2017,38(1):104–108.
                 [19]  李正芳,庞海杰.基于改进遗传算法的网络故障数据实时检测系统研究.现代电子技术,2018,41(13):138141,146. [doi: 10.16652/
                     j.issn.1004-373x.2018.13. 031]
                 [20]  曲朝阳,刘晓庆,辛鹏.基于 Hadoop 的变电站设备故障状态识别与预测模型.软件导刊,2015(3):61–63.
                 [22]  杨艳燕.云计算中基于相似性图的故障自动诊断方法.计算机测量与控制,2014,22(12):3877–3880.
                 [24]  琚安康,郭渊博,朱泰铭,王通.网络安全事件关联分析技术与工具研究.计算机科学,2017,44(2):38–45.
                 [30]  韩德帅,邢建春,杨启亮,李决龙.自适应软件动态过程时间特性建模与验证方法.计算机应用,2018(3):799–805.
                 [31]  徐立坤,李建路,朱珠,陈海平,王林.基于网络和时间约束的告警序列模式挖掘研究.计算机与数字工程,2019,47(9):2364–2368.
                 [34]  葛君伟,张博,方义秋.云计算环境下的资源监测模型研究.计算机工程,2011,37(11):31–33.
   74   75   76   77   78   79   80   81   82   83   84