《一种实时告警分析的网络安全风险评估方法》由会员分享,可在线阅读,更多相关《一种实时告警分析的网络安全风险评估方法(6页珍藏版)》请在金锄头文库上搜索。
1、B L H s B Z El :2009null10null06; : 2010null04null16bT e : L ( 1966- ) ,3 , = , 1 Z _ r | ) ,Enullmail: yugueishueiyahoo. b余贵水1, 李秀峰2, 蒋志归3, 魏钟记1(1.Z + v 0 , q 430033; 2.Z + ! , 100841; 3.92905 , , . d B 8 J S S ,2006,16( 1) :108- 113.LI Henulltian, LIU Yun, HE Denullquan. Review on study of risk ev
2、aluation for IT system security J . China SafetyScience Journal( CSSJ) , 2006,16( 1) :108- 113. ( in Chinese) 6 null ,+ y . Agent B d J . 9 ,2006, 22(3): 16- 18.ZHOU Zhennullyu, SHEN Jiannulljing. System model of network security risk assessment based on multinullAgent J.Microcomputer Information, 2
3、006, 22(3): 16- 18. ( in Chinese)(上接第101页) I D ( References) : 1 null SATO Y. A method for selfnullrecovering equalization J. IEEE Trans. on Comm. , 1975,23( 6) :679- 682. 2 null GODARD D N. Selfnullrecovering equalization and carrier trancing in townulldimensional data communication system J . IEEE
4、 Trans. Comm. ,1980, 28:1867- 1875. 3 null GOODWIN G C, SIN K S. Adaptive Filtering Prediction and Control M . New York:PrenticenullHall, 1984. 4 null HAYKIN S. Adaptive Filter Theory M . 3rd Ed. New York: PrenticenullHall, 1996. 5 null JIAN L, ZHANG X D. Blind adaptive multiuser detection based on
5、affine projection algorithm J . IEEE SignalProcessing Letters, 2005, 12(10) :673- 676. 6 null f ) ,c , . ( E J.Z + v , 2007, 19(2): 99- 102.ZHANG Shunullxia, ZHANG Songnullyang, JIANG Yunullzhong. Momentum constant modulus algorithm for blind channullnel equalization J. Journal of Naval University of Engineering, 2007,19( 2) :99- 102. ( in Chinese)&112& 海null 军null 工null 程null 大null 学null 学null 报null null null null null null null null null null null 22 null