[1]JAJODIA S, NOEL S, O'BERRY B. Managing cyber threats[M]. Berlin: Springer-Verlag 2005: 247-266.[2]LIU N, ZHANG J, ZHANG H, et al. Security assessment for communication networks of power control systems using attack graph and MCDM[J]. IEEE Transactions on Power Delivery,2010, 25(4): 1492-1500.[3]陈锋, 张仪, 鲍爱华,等. 基于攻击图的网络脆弱性量化评估研究[J].计算机工程与科学,2010,32(10): 8-11.[4]TEN C-W, LIU C-C, MANIMARAN G. Vulnerability assessment of cybersecurity for SCADA systems[J]. IEEE Transactions on Power Systems,2008,23(4): 1836-1846.[5]贾炜, 连一峰, 冯登国,等. 基于贝叶斯网络近似推理的网络脆弱性评估方法[J].通信学报学,2008,29(10): 192-198.[6]张永铮, 方滨兴, 迟悦,等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报,2007,30(2): 234-240.[7]苘大鹏,杨武,杨永田.基于弱点关联和安全需求的网络安全评估方法[J].高技术通讯,2009,19(2): 141-146.[8]FRIGAULT M, WANG L. Measuring network security using Bayesian network-based attack graphs[C]// COMPSAC'08: Proceedings of the 32nd Annual IEEE International Computer Software and Applications. Piscataway, NJ: IEEE Press, 2008: 698-703.[9]MAN D, YANG W, YANG Y, et al. A quantitative evaluation model for network security [C]// CIS 2007: Proceedings of 2007 International Conference on Computational Intelligence and Security. Washington, DC: IEEE Computer Society, 2007: 773-777.[10]孙亮, 李东, 张涛. 网络攻击图的自动生成[J]. 计算机应用研究, 2006, 23(3): 119-122.[11]FRIGAULT M, WANG L, SINGHAL A, et al. Measuring network security using dynamic Bayesian network[C]// QoP'08: Proceedings of the 4th ACM Workshop on Quality of Protection. New York: ACM Press, 2008: 23-30. |