1 |
UNAL B . Cybersecurity of NATO's space-based strategic assets[M]. London: Royal Institute of International Affairs, 2019.
|
2 |
TANG Z, ZHAO B K, YU W R, et al. Software defined satellite networks: benefits and challenges[C]//Proc. of the IEEE Computers, Communications and IT Applications Conference, 2014: 127-132.
|
3 |
韩晓露, 刘云, 张振江, 等. 网络安全态势感知理论与技术综述及难点问题研究[J]. 信息安全与通信保密, 2019, (7): 61- 71.
doi: 10.3969/j.issn.1009-8054.2019.07.010
|
|
HANG X L , LIU Y , ZAHNG Z J , et al. Review of the theory, technology and some difficult problems in network security situational awareness[J]. Information Security and Communications Privacy, 2019, (7): 61- 71.
doi: 10.3969/j.issn.1009-8054.2019.07.010
|
4 |
STROM B. Adversarial tactics, techniques and common know-ledge ATT&CK presentation[R]. MITRE Corp., 2015.
|
5 |
贾焰, 亓玉璐, 尚怀军, 等. 一种构建网络安全知识图谱的实用方法[J]. Engineering, 2018, 4 (1): 117- 133.
|
|
JIA Y , QI Y L , SHANG H J , et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018, 4 (1): 117- 133.
|
6 |
The MITRE Corporation. Common attack pattern enumeration and classification (CAPEC)[EB/OL]. [2020-10-1]. https://capec.mitre.org/.
|
7 |
The MITRE Corporation. Common weakness enumeration (CWE)[EB/OL]. [2020-10-1]. https://cwe.mitre.org/.
|
8 |
The MITRE Corporation. Common platform enumeration (CPE)[EB/OL]. [2020-10-1]. https://cpe.mitre.org/.
|
9 |
Forum of Incident Response and Security Teams. Common vulnerability scoring system (CVSS)[EB/OL]. [2020-10-1]. https://www.first.org/cvss/.
|
10 |
The MITRE Corporation. Common vulnerabilities and exposures (CVE)[EB/OL]. [2020-10-1]. https://cve.mitre.org/.
|
11 |
FENZ S, EKELHART A. Formalizing information security knowledge[C]//Proc. of the 4th International Symposium on Information, Computer, and Communications Security, 2009: 183-194.
|
12 |
SYED Z, PADIA A, FININ T W, et al. UCO: a unified cybersecurity ontology[C]//Proc. of the Workshops at the 30th AAAI Conference on Artificial Intelligence, 2016.
|
13 |
OLTRAMARI A, CRANOR L F, WALLS R J, et al. Building an ontology of cyber security[C]//Proc. of the Conference on Semantic Technology in Intelligence, Defense and Security, 2014: 54-61.
|
14 |
IANNACONE M, BOHN S, NAKAMURA G, et al. Developing an ontology for cyber security knowledge graphs[C]//Proc. of the 10th Annual Cyber and Information Security Research Conference, 2015.
|
15 |
USSATH M , JAEGER D , CHENG F , et al. Pushing the limits of cyber threat intelligence: extending STIX to support complex patterns[M]. London: Springer, 2016: 213- 225.
|
16 |
FRANSEN F , SMULDERS A , KERKDIJK R . Cyber security information exchange to gain insight into the effects of cyber threats and incidents[J]. E&I Elektrotechnik und Informationstechnik, 2015, 132 (2): 106- 112.
|
17 |
NARAYANAN S N, GANESAN A, JOSHI K, et al. Early detection of cybersecurity threats using collaborative cognition[C]//Proc. of the IEEE 4th International Conference on Collaboration and Internet Computing, 2018: 354-363.
|
18 |
VALE A P, FERNANDEZ E B. An ontology for security patterns[C]//Proc. of the 38th International Conference of the Chilean Computer Science Society, 2019: 1-8.
|
19 |
FERNANDEZ E B . Security patterns in practice: designing secure architectures using software patterns[M]. Hoboken, NJ: Wiley, 2013.
|
20 |
BRAZHUK A . Security patterns based approach to automatically select mitigations in ontology-driven threat modelling[J]. Open Semantic Technologies for Intelligent Systems, 2020, 25 (3): 267- 272.
|
21 |
SYED R . Cybersecurity vulnerability management: a concep-tual ontology and cyber intelligence alert system[J]. Information & Management, 2020, 57 (6): 103334.
|
22 |
LIU B , YAO L , HAN D P . Harnessing ontology and machine learning for RSO classification[J]. SpringerPlus, 2016, 5, 1655.
doi: 10.1186/s40064-016-3258-2
|
23 |
CAO H, WU L L, CHEN Y, et al. Analysis on the security of satellite Internet[C]//Proc. of the China Cyber Security Annual Conference, 2020: 193-205.
|
24 |
RAZA A, SOHAL P, CADDEN J, et al. Unikernels: the next stage of linux's dominance[C]//Proc. of the Workshop on Hot Topics in Operating Systems, 2019: 7-13.
|
25 |
VALLADO D A, CEFOLA P J. Two-line element sets-practice and use[C]//Proc. of the 63rd International Astronautical Congress, 2012.
|
26 |
王昊奋, 漆桂林, 陈华钧. 知识图谱: 方法、实践与应用[M]. 北京: 电子工业出版社, 2019.
|
|
WANG H F , QI G L , CHEN H J . Knowledge graph: me-thods, practices and applications[M]. Beijing: Publishing House of Electronics Industry, 2019.
|
27 |
HORROCKS I , PATEL-SCHNEIDER P F , BOLEY H , et al. SWRL: a semantic web rule language combining OWL and RuleML[J]. W3C Member Submission, 2004, 21 (79): 1- 31.
|
28 |
MUSEN M A . The protégé project: a look back and a look forward[J]. AI Matters, 2015, 1 (4): 4- 12.
doi: 10.1145/2757001.2757003
|
29 |
宗红, 陈义庆, 王淑一, 等. 一种自主恢复轨控故障时的星敏感器定姿方法[P]. 中国: 200710301591.6, 2008.
|
|
ZONG H, CHEN Y Q, WANG S Y, et al. A method for fixing the attitude of a star-sensitive device during autonomous recovery from orbital control failure[P]. China: 200710301591.6, 2008.
|
30 |
黄琳. 一种卫星姿态快速挽救方法[P]. 中国: 200810226836.8, 2009.
|
|
HUANG L. A fast rescue method for satellite attitude[P]. China: 200810226836.8, 2009.
|