{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部件”:[[2024,5,24]],“日期-时间”:“2024-05-24T17:34:03Z”,“时间戳”:1716572043323},“引用-计数”:50,“发布者”:“爱思唯尔BV”,“许可证”:[{“开始”:{-date-parts”:[2020,12,1]],”日期-时间“:”2020-12-01T00:00Z“,”timestamp“:1606780800000},”content-version“:“tdm”,“delay-in-days”:0,“URL”:“https:\/\/www.elsevier.com/tdm\/userlicense\/1.0\/”}],“出资人”:[{“DOI”:“10.13039\/501100008432”,“名称”:“Consejer\u00eda de Educaci\u00f3n y Empleo,Junta de Extremadura”,“DOI-asserted-by”:“publisher”,”奖项“:[”GRU18138“]},{“DOI”:”10.13039 \/5010000780“,”name“:”European Union“,”DOI-asserted-by“:”publisher“}],“content-domain”:{“domain”:[“elsevier.com”,“sciencedirect.com”],“crossmark-restriction”:true},“short-container-title”:[“Future Generation Computer Systems”],”published-print“:{”date-parts“:[2020,12]},”DOI“:”10.1016\/j.Future.2020.07.015“,”type“:”journal-article“,”created“:{”date-ports“:[2020,7,18]],”date-time“:”2020-07-18 T14:49:07Z“,”时间戳“:1595083747000},“page”:“488-505”,“update-policy”:”http://\/dx.doi.org\/10.1016\/elsevier_cm_policy“,”source“:”Crossref“,“is-referenced-by-count”:24,“title”:[“基于安全事件管理的威胁分类和安全风险估计的新方法”],“prefix”:“10.1016”,“volume”:“113”,“author”:[{“given”:《Jos\u00e9 Carlos》,“family”:“Sancho”,“sequence”:“first”,“affiliation”:[]},{“given”:“Andr\u00e9s”,“family”:“Caro”,“serquence”:“additional”,“abfiliation“:[]{”given“:”Mar“,”family“:”\u00c1vila“,”sequence“:”additional“,”affiliance“:[]},:“78”,“引用”:[{“键”:“10.1016\/j.future.2020.07.015_b1”,“doi-asserted-by”:“crossref”,“first page”:“907”,“doi”:“10.116\/j.future.2019.03.056”,“article-title”:“用于生成合成数据集的击键动力学样本的统计建模”,“volume”:”100“,”author“:”Migdal“,”year“:”2019“,”journal-title“:”future Gener.Comput.Syst.“},{”key“:“10.1016\/j.future.2020.07.015_52”,“doi-asserted-by”:“crossref”,“first page”:“321”,“doi”:“10.1613\/jair.953”,“article-title”:“SMOTE合成少数群体过采样技术”,“volume”:”16“,“author”:“Nitesh V.\u00a0Chawla”,“year”:“2002”,“journal-title“:”j.Artificial Intelligence Res.3英寸,“非结构化”:“IBM,IBM QRadar SIEM,(n.d.),https:\/\/www.IBM.com/es-es\/marketplace\/IBM-QRadar-SIEM.”},{“key”:“10.1016\/j.future.2020.07.015_b4”,“unstructured”:“A.E.S.M.(ESM),安全信息和事件管理(SIEM),(n.d),http:\/\www.microocus.com/en-us\/products\/SIEM-Security-Information-Event-Management\/overview”}、{“密钥”:“10.1016\/j.future.2020.07.015_b5”,“unstructured”:“赛门铁克,赛门铁克托管安全服务,(n.d.),https://www.Symantec.com/Services\/cyber-Security-Services\/Managed-Security-servers.”},{“key”:“10.116\/j.future.2020 0.07.015-b6”,“非结构化”:“McAfee,Informaci\u00f3n de seguridad y administraci\u00f3n de eventos(SIEM),(n.d),https:\/\/www.mcafee.com/enterprise\/es-es\/products\/siem-products.html。“},{”key“:”10.1016\/j.future.200.07.015_b7“,”非结构化“:”Alienvault,Alienvault Cibersecurity,(n.d.),https:\/\/alientvault.com“},{”key“:”10.1016\/j.future.200.07.015_b8“,”非结构化“:”OSSIM,开源安全信息管理,(n.d.)“},{”key“:”10.1016\/j.future.200.07.015_b9“,”非结构化“:”Fortinet,FortiSIEM:强大的安全信息和事件管理,(n.d.),https:\/\/www.Fortinet.com/products\/siem\/FortiSIEM.html。“},{”key“:”10.1016\/j.future.2020.07.015_b10“,”doi-asserted-by“:”crossref“,”first page“:“6”,“doi”:“10.1016\/S1353-4858(08)70139-9”,“article-title”:“自动化安全事件管理”,“volume”:“2008”,“author”:“Libeau”,“year”:“08”,“journal-title“:”Netw.Secur.“}”,{“key”:15_b11“,”文章标题“:”安全信息和事件管理(SIEM)在现代组织中的重要性”,“卷”:“8”,“作者”:“Chopra”,“年份”:“2019年”,“新闻标题”:“国际J.Innov。Technol公司。探索。Eng.“},{“key”:“10.1016\/j.future.200.07.015_b12”,“doi断言者”:“crossref”,“首页”:“47”,“doi”:“10.1016\/j.jpdc.2018.1.10.006”,“文章标题”:“增强主动网络威胁情报”,“卷”:“124”,“作者”:“Khan”,“年份”:“2019”,“期刊标题”:“j.Parallel Distrib.Comput.”},{“key”:“10.1016\/j.future.200.07.015_b13”,“doi-asserted-by“:”crossref“,”first page“:”1“,”doi“:”10.1016\/j.comcom.2014.04.012“,”article-title“:”signature-based入侵检测系统中的虚警最小化技术:A survey“,”volume“:“49”,”author“:”Hubballi“,”year“:”2014“,”journal-title”:“Compute”。Commun公司。“},{”key“:”10.1016\/j.future.2020.07.015_b14“,”doi-asserted-by“:”crossref“,”first page“:“36”,“doi”:“10.1109\/MSP.2012.61”,“article-title”:“分布式系统环境中的安全事件监视”,“volume”:“11”,“author”:“Kufel”,“year”:“2013”,“journal-title“:”IEEE Secur.Priv.“}”,{“key”:15“,”首页“:”2182“,”article-title“:”基于SIEM的IoT-botnet DDoS攻击检测和缓解“,“volume”:“10”,“author”:“Al-Duwairi”,“year”:“2020”,“journal-title”:“Int.J.Electr。计算。工程“},{”key“:”10.1016\/j.future.2020.07.015_b16“,”首页“:”3186“,”article-title“:”Smart SIEM:From big data logs and events to Smart data alerts“,”volume“:“8”,”author“:”El\u00a0Arass“,”year“:”2019“,”journal-title”:“Int.j.Innov.Technol.Explor.Eng.”},”{“key”:“10.1016//j.futere.2020.070.15_b17”,”doi-asserted-by“:”crossref“,”first page“:”5428“,”DOI“:”10.1109\/TII.2018.2857213“,”文章标题“:”OSINT效度分析的信度比较方法“,”卷“:”14“,”作者“:”龚“,”年份“:”2018“,”期刊标题“:“IEEE Trans。Ind.通知。“},{”key“:”10.1016\/j.future.2020.07.015_b18“,”doi-asserted-by“:”crossref“,”first page“:“165607”,“doi”:“10.1109\/ACCESS.2019.2953095”,“article-title”:“基于使用事件配置文件的人工神经网络的网络威胁检测”,“volume”:“7”,”author“:”Lee“,”year“:”2019“,”journal-title“:”IEEE ACCESS.7.015_b19“,”doi-asserted-by“:”crossref“,”first page“:”145“,“doi”:“10.1016\/j.inffus.2013.04.009”,“article-title”:“为SIEM系统提供自适应”,“volume”:“21”,“author”:“Suarez-Tangil”,“year”:“2015”,“journal-title“:”Inf.Fusion。“},{”key“:”10.1016\/j.future.2020.07.015_b20“,”series-title“:”威胁建模:安全设计“,”author“:”Shostack“,”year“:”2014“}、{”密钥“:”101016\/j.futere.2020.070.15_b21“,”非结构化“:”ATT&CK,MITRE,(n.d.),https:\/attack.MITRE.org\/.“}”,{“key”:“10.1016//j.furture.2020.07.015_b22”,“首页“:”271“,”文章标题“:”基于STRIDE威胁模型的网上银行安全分析“,”卷“:”8“,”作者“:”鑫“,”年份“:”2014“,”期刊标题“:”Int.J.Secur“。申请。“},{”key“:”10.1016\/j.future.2020.07.015_b23“,”first page“::“10.1186\/s13677-018-0119-2“,“article-title”:“Logdrive:iaas云环境中时间旅行取证调查的主动数据收集和分析框架”,“volume”:“7”,“author”:“Hirano”,“year”:“2018”,“journal-title“:“J.cloud Compute”。“},{”key“:”10.1016\/j.future.2020.07.015_b25“,”doi-asserted-by“:”crossref“,”doi“:”10.3390\/computers5040027“,”article-title“:”用于医疗保健的网络物理系统体系结构的安全分析“,”volume“:“5”,”author“:”Seifert“,”year“:”2016“,”journal-title”:“Computers.”},“key”:“10.1016\\j.futer.2020.07.015_b26”,“非结构化”:“M。Abomhara,M.Gerdes,《远程医疗系统基于STRIDE的威胁模型》,Mohamed Abomhara-,Martin Gerdes-,Geir M.K\u00f8ien信息和通信技术部,2015年key“:”10.1016\/j.future.2020.07.015_b28“,”doi-asserted-by“:”crossref“,”unstructured“:”j.Lopez,j.Zhou,M.S.Eds,D.Hutchison,Towards security that matter 1(2018)47\u201362,http://\/dx.doi.org\/10.1007\/978-3319-72817-9.“,”doi“:”101007\/978-2319-72817-9 series-title“:”威胁建模的混合方法”,“作者”:“Krishnan”,“年份”:“2017”},{“密钥”:“10.1016\/j.future.200.07.015_b30”,“doi断言”:“crossref”,“非结构化”:“R.Kl\u00f6ti,V.Kotronics,P.Smith,OpenFlow:安全分析,载于:Proc.-Int.Conf.Netw.Protoc.ICNP.2013,http:\/\/dx.doi.org/10.1109\/ICNP.2013.6733671.”,“doi”:“10.1109\/ICNP.2013.6733671“},{“key”:“10.1016\/j.future.2020.07.015_b31”,“unstructured”:“Microsoft,改进Web应用程序安全:威胁和对策-2003年6月\/Ch 3:威胁建模,(n.d.),https:\/\/docs.Microsoft.com/en-us\/previous-versions\/msp-n-p/ff648644(v=pandp.10)?redirectedfrom=MSDN.”},}“密钥”:“10.1016\/j.future.2020.07.015_b32“,”unstructured“:”M.Vulnerability,S.Classification,Server\u2013 Severity Pivot,2018。“},{”key“:”10.1016\/j.future.202.07.015_533“,”series-title“:”安全开发生命周期:SDL过程指南5.1版“,”first page“:doi-asserted-by“:”crossref“,”first page“:”190“,“doi”:“10.1016\/j.future.2019.07.053”,“article-title”:“科学流中数据包丢失预测的机器学习方法”,“volume”:“102”,“author”:“Giannakou”,“year”:“2019”,“journal-title“:”future Gener。计算。系统。“},{”key“:”10.1016\/j.future.2020.07.015_b35“,”article-title“:”机器学习网络入侵检测数据的交互式三维可视化“,”author“:”Zong“,”year“:”2019“,”journal-title”:“future Gener.Comput.Syst.”},“{”key“:10.1016\/j.future.2018.08.021”,“article-title”:“基于seq2seq网络的认知物联网大数据日志分析”,“volume”:“90”,“author”:“Wu”,“year”:“2019”,“journal-title“:“future Gener”。计算。系统。“},{”key“:”10.1016\/j.future.2020.07.015_b37“,”doi-asserted-by“:”crossref“,”first page“:“375”,“doi”:“10.1016\/j.future.2015.09.009”,“article-title”:“安全警报的自动根本原因识别:SaaS云评估”,“volume”:“56”,“author”:“Cotroneo”,“year”:“2016”,“journal-title“:”future Gener.Comput.Syst.“}”,{“key”:”10.1016\/j.future.2020.07.015_b38“,“非结构化”:“Fortinet,Fortinet被提名为2018年Gartner企业防火墙幻方图的领导者,2018年,https:\/\/www.Fortinet.com/products\/next-generation-Firewall.html。“},{”key“:”10.1016\/j.future.2020.07.015_b39“,”unstructured“:”IETF(互联网工程任务组),Syslog协议,2009年。https:\/\/tools.ietf.org\/html\/rfc5424.“},{“key”:“10.1016\/j.future.2020.07.015_b40”,“series-title”:“数据挖掘:实用机器学习工具和技术”,“author”:“Witten”,“year”:“2011”},}“keys”:“101016\/j.futore.2020.07015_b41”,“unstructured”:“W.N.Venables,D.M.Smith,Official@An Introduction to R,R.0,2011.”}、{“密钥”:“10.1016\/j.future.2020.07.015_b42“,”series-title“:”Lect。注释Artif。智力。“,”first page“:”241“,”article-title“:”Logistic model trees“,”volume“:“vol.2837”,”author“:”Landwehr“,”year“:”2003“},{“key”:“10.1016\/j.future.2020.07.015_b43”,”first-page“:”302“,”article-title“:”C4“。5:机器学习程序“,”卷“:”240“,”作者“:”昆兰\u00a0Ross“,”年份“:”1993“,”新闻标题“:”马赫。学习。“},{”key“:”10.1016\/j.future.2020.07.015_b44“,”series-title“:”Breiman2001-随机森林“,”首页“:”1“,”author“:”布雷曼“,”year“:”2001“}”,{“key”:“10.1016\/j.future.202.07.015_bs5”,“series-ttle”:“估计贝叶斯分类器中的连续分布”,“author”:“Jhon”,“year”:“1995”},j.future.2020.07.015_b46“,”非结构化“:”R.R.Bouckaert,韦卡贝叶斯网络分类器,工作论文系列。怀卡托大学计算机科学系。第14\/2004号,新西兰汉密尔顿怀卡托大学,2004年。“},{”key“:”10.1016\/j.future.2020.07.015_b47“,”doi-asserted-by“:”crossref“,”first page“:“37”,“doi”:“10.1007\/BF00153759”,“article-title”:“基于实例的学习算法”,“volume”:“6”,“author”:“Aha”,“year”:“1991”,“journal-title“:”Mach.Learn.“}”,{“key”:”10.1016\/j.future.2020.07.015_b48“,”doi-asserted-by“:”crossref“,”first page“:”637“,”doi“:”10.1162\/089976601300014493“,”article-title“:”用于SVM分类器设计的Platt\u2019s SMO算法的改进“,”volume“:“13”,”author“:”Keerthi“,“year”:“2001”,“journal-title”:“Neural Compute”。“},{”key“:”10.1016\/j.future.2020.07.015_b49“,”series-title“:”Kappa Statistic“,”first page“:“360”,”article-title“:“Vierra 2005 interrater agreement”,”author“:”Viera“,”year“:”2005“}”{Symantec,严重性评估:威胁、事件、漏洞、风险,2006年,https:\/\/www.Symantec.com/content\/en\/us\/about\/media\/securityintelligence\/SSR-Severity-Assesment.pdf。“}],”容器标题“:[”未来一代计算机系统“],”原始标题“:[],”语言“:”en“,”链接“:[{”URL“:”https:\/\/api.elsevier.com/content\/article\/PII:S016677739X20301849?httpAccept=text\/xml“,”内容类型“:”text\/xml“,”内容版本“:”vor“,”预期应用程序“:”文本挖掘“},{”URL“:”https:\/\/api.elsevier.com/content\/article\/PII:S0167739X20301849?httpAccept=text\/plain“,”content-type“:”text\/prain“,“content-version”:“vor”,“intended-application”:“text-mining”}],“deposed”:{“date-parts”:[[2020,8,29]],“date-time”:“2020-08-29T12:27:13Z”,“timestamp”:1598704033000},“score”:1,“resource”:{“primary”:“URL”:“https://linkinghub.elsevier.com\/retrieve\/pii\/S0 167739X20301849“}},”副标题“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2020,12]]},”references-count“:50,”alternative-id“:[”S0167739X20301849“],”URL“:”http://\/dx.doi.org\/10.1016\/j.future.2020.07.015“,”relation“:{},“ISSN”:[”0167-739X“],“ISSN-type”:[{“value”:“0167-739”X“,”type“:”print“}],”subject“:[],“published”:{“date-parts”:[[2020,12]]},“assertion”:[{“value”:“Elsevier”,“name“:”publisher“,”label“:”本文由“},{”value“:”基于安全事件管理的威胁分类和安全风险评估的新方法“,”name“:“articletite”,“label”:“article Title”},“value”:“Future Generation Computer Systems”,“name”:“journaltitle”,“table”:“Journal Title“}https:\/\/doi.org\/10.1016\/j.future.2020.07.015“,”name“:”articlelink“,”label“:”CrossRef doi link to publisher maintained version“},”{“value”:“article”,“name”:“content_type”,“label”:“content-type”},{“value”:“\u00a9 2020 Elsevier B.V.保留所有权利。”,“名称”:“版权”,“标签”:“copyright”}]}