[1] ORTALO R, DESWARTE Y, KAANICHE M. Experimenting with quantitative evaluation tools for monitoring operational security [J]. IEEE Transactions on Software Engineering, 1999, 25(5): 633-651.[2] JONSSON E, OLOVSSON T. A quantitative model of the security intrusion process based on attacker behavior [J]. IEEE Transactions on Software Engineering, 1997, 23(4): 235-24.[3] GOSEVA-POPSTOJANOVA K, WANG F, WANG R, et al. Characterizing intrusion tolerant systems using a state transition model [C]// DISCEX'01: Proceedings of the DARPA Information Survivability Conference and Exposition. Anaheim, CA: [s.n.], 2001: 211-221.[4] MEHTA V, BARTZIS C, ZHU H, et al. Ranking attack graphs [C]// RAID 2006: Proceedings of the International Symposium on the Recent Advances in Intrusion Detection. Berlin: Springer-Verlag, 2006: 127-144.[5] 黄光球,乔坤,朱华平.基于FPN的模糊攻击图模型及生成算法研究[J].微电子学与计算机,2007,24(5):162-165.[6] 黄光球,任大勇.基于双枝模糊决策与模糊Petri网的攻击模型[J].计算机应用,2007,27(11):2689-2693.[7] 黄光球,王金成.基于双枝模糊集的一致性模糊变权Petri网攻击模型[J].计算机应用,2009,29(2):529-533.[8] 黄光球,李艳.基于粗糙图的网络风险评估模型[J].计算机应用,2010,30(1):190-195.[9] 苘大鹏,张冰,周渊,等.一种深度优先的攻击图生成方法[J].吉林大学学报:工学版,2009,39(2):447-451.[10] 赵芳芳,陈秀真,李建华.基于权限提升的网络攻击图生成方法[J].计算机工程,2008,34(23):158-160.[11] 姜伟,方滨兴,田志宏.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-825.[12] 王纯子,黄光球.基于脆弱性关联模型的网络威胁分析[J].计算机应用,2010,30(11):3046-3050. |