[1] BRUCE L. Managed Vulnerability Assessment (MVA) — Mprove security by understanding your own vulnerabilities! [J]. Network Security, 2002(4):8-9. [2] RITECHEY R W, AMMANN P. Using model checking to analyze network vulnerabilities [C]//S&P 2000: Proceedings of the 2000 IEEE Symposium on Research on Security and Privacy. Washington, DC: IEEE Computer Society, 2000: 156-165. [3] AMMANN P,WIJESEKERA D, KAUSHIK S. Scalable, graph based network vulnerability analysis [C]//CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 217-224. [4] SHEYNER O, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs [C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2002: 273-284. [5] WU D, LIAN Y, CHEN K, et al. A security threats identification and analysis method based on attack graph [J]. Chinese Journal of Computers, 2012, 35(9): 1938-1950. (吴迪, 连一峰, 陈恺, 等. 一种基于攻击图的安全威胁识别和分析方法[J]. 计算机学报, 2012, 35(9): 1938-1950.) [6] INGOLS K, LIPPMANN R, PIWOWARSKI K. Practical attack graph generation for network defense [C]//ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference. Piscataway: IEEE, 2006: 121-130. [7] INGOLS K, CHU M, LIPPMANN R, et al. Modeling modern network attacks and counter measures using attack graphs [C]//ACSAC '09: Proceedings of the 25th Annual Computer Security Applications Conference. Piscataway: IEEE, 2009: 117-126. [8] HOMER J, VARIKUTI A, OU X, et al. Improving attack graph visualization through data reduction and attack grouping [C]//VizSec 2008: Proceedings of the 5th International Workshop on Visualization for Computer Security, LNCS 5210. Belin: Springer, 2008: 68-79. [9] WANG Y, XIAN M, LIU J, et al. Study of network security evaluation based on attack graph model [J]. Journal on Communications, 2007, 28(3): 29-34. (王永杰,鲜明,刘进,等.基于攻击图模型的网络安全评估研究[J]. 通信学报, 2007, 28(3): 29-34.) [10] ZHANG T, HU M, YUN X, et al. Research on computer network security analysis model [J]. Journal on Communications, 2006, 26(12): 100-109. (张涛,胡铭曾,云晓春,等.计算机网络安全性分析建模研究[J].通信学报,2006, 26(12):100-109.) [11] CHEN X, ZHENG Q, GUAN X, et al. Quantitative hierarchical threat evaluation model for network security [J]. Journal of Software, 2006, 17(4): 885-897. (陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.) [12] HE H, ZHANG H, WANG X, et al. Detriment quantitative assessment of the network security incident [J]. Journal of Harbin Institute of Technology, 2012, 44(5): 66-70. (何慧,张宏莉,王星,等.网络安全事件危害度的量化评估[J]. 哈尔滨工业大学学报, 2012, 44(5): 66-70.) [13] YE Y, XU X, JIA Y. An attack graph-based probabilistic computing approach of network security [J]. Chinese Journal of Computers, 2010,33(10):1987-1996. (叶云,徐锡山,贾焰.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996.) [14] CHEN X, FANG B, TAN Q, et al. Inferring attack intent of malicious insider based on probabilistic attack graph model [J]. Chinese Journal of Computers, 2014, 37(1):62-72. (陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.) [15] ZHANG Y, FANG B, CHI Y, et al. Risk propagation model for assessing network information systems [J]. Journal of Software, 2007, 18(1): 137-145. (张永铮,方滨兴,迟悦,等.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145.) [16] JIANG W, FANG B, TIAN Z, et al. Evaluating network security and optimal active defense based on attack-defense game mode [J]. Journal of Software, 2009, 32(4): 817-827. (姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].软件学报,2009,32(4):817-827.) [17] WATTS D J. A simple model of global cascades on random networks [J]. Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(9): 5766-5771. [18] GOLDENBERG J, LIBAI B, MULLER E. Talk of the network: a complex systems look at the underlying process of word-of-mouth [J]. Marketing Letters, 2001, 12(3): 211-223. [19] YOUNG H P. The diffusion of innovations in social networks, SFI Working Paper 2002-04-018 [R/OL]. Baltimore: The Johns Hopkins University, Department of Economics, 2002 [2015-03-17]. http://samoa.santafe.edu/media/workingpapers/02-04-018.pdf. |