參考文獻 |
中文參考文獻
[1] 劉美君,一種利用彩色派翠網關聯警訊以重建多步驟攻擊的方法,國立中央大學資訊管理學系碩士論文,6 月2004。
[2] 官炳宏,結合隱藏式馬可夫模型與彩色派翠網以關聯多步驟攻擊警訊之方法,國立中央大學資訊管理學系碩士論文,6 月2005。
[3] 黃志豪,一個使用模組化方式來重建多步驟攻擊情境的方法,國立中央大學資訊管理學系碩士論文,6 月2006。
[4] Seednet教室-企業縱深防禦的最佳資安保鑣,HTUhttp://eservice.seed.net.tw/class/class97.htmlUTH,Accessed on March 28, 2007.。
[5] 樊國楨、林樹國及歐崇明,資安監控中心之終極目標:資訊分享與分析中心初探,資通安全專論T95002,HTUhttp://ics.stpi.org.tw/Treatise/doc/17.pdfUTH,Accessed on April 1, 2007.。
[6] 台灣電腦網路危機處理暨協調中心,保護及強化企業內部網路的安全,HUhttp://www.cert.org.tw/document/column/show.php?key=72UH,Accessed on April 20, 2007.。。
[7] 台灣賽門鐵克,管理企業內的資安事端(Security Incidents),HTUhttp://www.symantec.com/region/tw/enterprise/article/security_incidents.html#what_if_notUTH,Accessed on Jan 1, 2007.。
[8] 凌羣電腦蔡坤家,SYSCOM SIM(Security Information Management),HTUhttp://download.microsoft.com/download/5/3/7/5372d49c-fbee-4cb4-84b0-03a7b93b262f/6-2004MgmtDay_Syscom-SIM.pptUTH,Accessed on Jan 10, 2007.。。
[9] 網路聯防技術,HTUhttp://www.broadweb.com.tw/rdshow/3-2-2.phpUTH,Accessed on Jan 9, 2007.。。
[10] 聯合Juniper / Fortinet / McAfee等設備,縱深聯防,鎖住內敵!,HTUhttp://www.l7-networks.com/L7_2005/products.IL_features.b5.phpUTH,Accessed on Jan 9, 2007.。。
[11] 梁日誠,自建型資通安全防護中心—mini SOC簡介,2004/11/13,
HTUhttp://www.informationsecurity.com.tw/feature/view.asp?fid=285UTH,Accessed on March 3, 2007.。
英文參考文獻
[12] Adam L. Berger, Stephen A. Della Pietra, and Vincent J. Della Pietra, “A Maximum Entropy Approach to Natural Language Processing,” Computational Linguistics, Volume 22, Number 1, 1996.
[13] Adam Berger, “A Brief Maxent Tutorial,” Hhttp://www.cs.cmu.edu/afs/cs/user/aberger/www/html/tutorial/tutorial.htmlH, 1996.
[14] Adam Berger, Stephen Della Pietra, and Vincent Della Pietra, “A maximum entropy approach to natural language processing,” Computational Linguistics, March 1996.
[15] Andy Franz, Radek Mista, David Bakken, Curtis Dyreson, and Murali Medidi, “Mr. Fusion: A Programmable Data Fusion Middleware Subsystem with a Tunable Statistical Profiling Service,” In Proceedings of the International Conference on Dependable Systems and Networks (DSN-2002), IEEE/IFIP, 23-26 June, 2002, Washington, DC.
[16] Ambareen Siraj, “A Unified Alert Fusion Model for Intelligent Analysis of Sensor Data in an Intrusion Detection Environment,” A Dissertation Submitted to the Faculty of Mississippi State University, Mississippi, August 2006.
[17] Ambareen Siraj, Rayford B. Vaughm, and Susan M. Bridges, “Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture," In Proceedings of the 37th Hawaii International Conference on System Sciences, IEEE, 5-8 Jan, 2004.
[18] Ambareen Siraj, Susan M. Bridges, and Rayford B. Vaughn, “Fuzzy Cognitive Maps for Decision Support in an Intelligent Intrusion Detection System,” In IFSA World Congress and 20th NAFIPS International Conference, 25-28 July, 2001.
[19] Amy R. Pritchett and R. John Hansman, “Pilot Non-Conformance to Alerting System Commands During Closely Spaced Parallel Approaches,” MIT Aeronautical Systems Lab. Rep., ASL-97-2, Cambridge, MA, Jan. 1997.
[20] Andy Franz, Radek Mista, David Bakken, Curtis Dyreson, and Murali Medidi, “Mr. Fusion: A Programmable Data Fusion Middleware Subsystem with a Tunable Statistical Profiling Service,” In Proceedings of the International Conference on Dependable Systems and Networks, IEEE/IFIP, June 23-26, 2002, Washington, DC.
[21] Bart Kosko, “Fuzzy cognitive maps,” International Journal Man-Machine Studies, Vol24, 1986.
[22] CERT/CC Statistics 1988-2006, Hhttp://www.cert.org/stats/H, Accessed on March 16, 2007.
[23] David L. Hall, “Mathematical Techniques in Multisensor Data Fusion,” 1992, Atrech House, Boston, MA.
[24] Dong Yu and Deborah Frincke, “Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory,” 43rd ACM Southeast Conference, March 18-20, 2005, Kennesaw, GA, USA.
[25] Heeseo Ghae, Tae Yon Kim, Dong-hyun Lee, and Hoh Peter, “Conflict Resolution Model Based on Weight in Situation Aware Collaboration System,” In Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems(FTDCS’07), 2007.
[26] Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister, “System Architecture Directions for Networked Sensors,” In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), pp. 93-104, ACM SIGPLAN, November 2000.
[27] Lai Jibao, Wang Huiqiang, and Zhu Liang, “Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory,” 2006.
[28] Lixia Song and James K. Kuchar, “Dissonance Between Multiple Alerting Systems Part I: Modeling and Analysis,” Systems, Man and Cybernetics, Part A, Volume 33, Issue 3, May 2003 Page(s): 366 – 375.
[29] John Harrald and Theresa Jefferson, “Shared Situational Awareness in Emergency Management Mitigation and Response,” In Proceedings of the 40th Hawaii International Conference on System Sciences, 2007.
[30] Maximilian Reiss, Bernhard Sick, and Markus Strassberger, “Collaborative Situation-Awareness in Vehicles by Means of Spatio-Temporal Information Fusion With Probabilistic Networks,” Adaptive and Learning Systems, 2006 IEEE Mountain Workshop on, 2006.
[31] Mica Endsley, “Design and evaluation for situation awareness enhancement,” In Proceedings of the Human Factors Society 32nd Annual Meeting, Human Factors Society, 1988, pp. 97-101.
[32] Mike Gilger, “Addressing Information Display Weaknesses for Situational Awareness,” In Military Communications Conference, 2006.
[33] Renaud Bidou, “Security Operation Center Concepts & Implementation,” Hhttp://www.iv2-technologies.com/images/Iv2-WP-SOCConcept.pdfH , Accessed on March 16, 2007.
[34] Shilad Sen, Werner Geyer, Michael Muller, Marty Moore, Beth Brownholtz, Eric Wilcox, and David R. Millen, “FeedMe: A Collaborative Alert Filtering System,”In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, 2006.
[35] Situational awareness, from Wikipedia, the free encyclopedia, HTUhttp://en.wikipedia.org/wiki/Situational_awarenessUTH, Accessed on April 15, 2007.。.
[36] Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, and Hyunsoo Yoon, “Real-time analysis of intrusion detection alerts via correlation,” Computers & Security (2006) 25, p169-183.
[37] Stephen G.Batsell, Nageswara S.Rao, and Mallikarjun Shankar, “Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security,” http://www.ioc.oml.gov/projects/documents/containment.pdf, 2005.
[38] Tim Bass, “Intrusion Detection Systems and Multisensor Data Fusion,” Communications of the ACM, April 2000, Vol. 43, No. 4.
[39] Theodor Jandeweith, “The use of an Expert System to expand a Multi Sensor Fire Detector to a Robust Fire Detector,” Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference, Oct. 1995.
[40] Veronique Clement, Gerard Giraudon, Stephane Houzelle, and Fadi Sandakly, “Interpretation of Remotely Sensed Images in a Context of Multisensor Fusion Using a Multispecialist Architecture,” IEEE Transactions on Geoscience and Remote Sensing, VOL. 31, No. 4, JULY 1993.
[41] Xiaoxin Yin, William Yurcik, and Adam Slagell, “The Design of VisFlowConnect-IP: a Link Analysis System for IP Security Situational Awareness,” The third IEEE International Workshop on Information Assurance (IWIA), 2005, pp.141-153. |