[1]陆斌,华楠,郑小平,等.基于人工智能的网络告警关联分析处理的应用[J].邮电设计技术,2018,(12):1-6.[doi:10.12045/j.issn.1007-3043.2018.12.001]
 Lu Bin*,Hua Nan*,Zheng Xiaoping*,et al.Application of Network Alarm Association Analysis Processing Based on Artificial Intelligence[J].Designing Techniques of Posts and Telecommunications,2018,(12):1-6.[doi:10.12045/j.issn.1007-3043.2018.12.001]
点击复制

基于人工智能的网络告警关联分析处理的应用

参考文献/References:

[1] 邓歆,孟洛明.智能分布式通信网告警相关性模型及实现[J]. 电子与信息学报,2006,28(10):1902-1905

[2] 朱秋艳.基于关联规则挖掘的网络告警关联[D]. 北京:北京邮电大学,2008.

[3] 于漫.电信网络智能化告警系统研究与实现[D]. 长春:长春工业大学,2010.

[4] 黄宇.关联规则分析在电信告警系统中的研究与应用[D]. 成都:电子科学技术大学,2007

[5] 王仲佳.具有动态加权特性的关联规则算法及其在电信故障告警序列模式发掘中的应用[D]. 吉林:吉林大学,2005.

[6] 杨一兵.移动通信网络告警及其关联分析[D].哈尔滨:还尔滨工程大学,2008.

[7] 刘斌.移动通信网络故障告警关联分析方法与系统实现[ D]. 长沙:中南大学,2009.

[8] Harrison K.A, INCL HP Labs. Event Correlation in Telecommunication Network Management. 1994. 9

[9] Sterritt R, Bustard D, McCrea A. Autonomic computing correlation for fault management system evolution[C]. Proceedings of IEEE International Conference on Industrial Informatics, India, 21-24 Aug.2003:233-247.

[10] M.?Ester,?H.P.?Kriegel,?J.?Sander,?X.?Xu. A density-based algorithm for discovering clusters in large spatial databases with noise.Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, Oregon?(1996), pp.?226-231

[11]D.P.?de Oliveira,?J.H.?Garrett?Jr.,?L.?Soibelman. A density-based spatial clustering approach for defining local indicators of drinking water distribution pipe breakage

Advanced Engineering Informatics,?25?(2011), pp.?380-389

[12] Bin Zhu, Ali A. Ghorbani. Alert Correlation for Extracting AttackStrategies[J]. International Journal of Network Security, Nov. 2006.

[13] A. Valdes and K. Skinner, “Probabilistic alert correlation,” in Proceedings of Recent Advances inIntrusion Detection, 4th International Symposium,(RAID 2001), LNCS 2212, pp. 54–68, Springer-Verlag, Davis, CA, USA, Oct. 2001.

[14] North Carolina State University Cyber Defense Laboratory, Tiaa: A Toolkit for Intrusion Alert Analysis,http://discovery.csc.ncsu.edu/software/correlator/ver0.4/index.html, Apr. 10th, 2005, last accessed.

[15] P. Ning and Y. Cui, An Intrusion Alert CorrelatorBased on Prerequisites of Intrusions, Tech. ReportTR-2002-01, North Carolina State University, USA,Jan. 2002.

相似文献/References:

[1]瞿俊.TD-SCDMA单通优化策略与预警研究[J].邮电设计技术,2014,(07):71.
 Qu Jun.TD-SCDMA Single-pass Optimization Strategies and Early Warning Research[J].Designing Techniques of Posts and Telecommunications,2014,(12):71.
[2]刘洋,盛璟,张曼,等.WCDMA网络用户感知与无线环境关联分析研究[J].邮电设计技术,2015,(02):57.[doi:10.16463/j.cnki.issn1007-3043.2015.02.012]
 LiuYang,Sheng Jing,Zhang Man,et al.Research on RelevanceAnalysis of WCDMA NetworkUser Experience and RadioEnvironment[J].Designing Techniques of Posts and Telecommunications,2015,(12):57.[doi:10.16463/j.cnki.issn1007-3043.2015.02.012]

备注/Memo

作者简介

更新日期/Last Update: 2019-01-24