[1] CONTI M, GIORDANO S. Mobile Ad Hoc networking:milestones, challenges, and new research directions[J]. IEEE Communications Magazine, 2014, 52(1):85-96. [2] WANG Y. Research on topology evolution and routing strategy for mobile Ad Hoc network[D]. Beijing:Beijing University of Posts and Telecommunications, 2013:10-12. (王英赫.移动自组织网络的拓扑演进及路由策略研究[D].北京:北京邮电大学,2013:10-12.) [3] ZHANG X, FENG D. A cluster based security scheme in wireless Ad Hoc networks[J]. Journal of Computer Research and Development, 2006, 43(2):238-243. (张晓宁,冯登国.无线自组网络中基于簇结构的安全方案[J].计算机研究与发展,2006,43(2):238-243.) [4] WU Y, LI X, LU K. Information security risk assessment[M]. Beijing:Tsinghua University Press, 2007:33-42. (吴亚非,李新友,禄凯.信息安全风险评估[M].北京:清华大学出版社,2007:33-42.) [5] SHEN L, CAO G. Network security evaluation model based on multi-person analytic network process in commercial banks[J]. Journal of Computer Applications, 2012, 32(2):480-484. (沈利香,曹国.基于多人网络层次分析法的商业银行网络安全评估模型[J].计算机应用,2012,32(2):480-484.) [6] DAI Z, LUO W. Information system security[M]. Beijing:Gold Wall Press, 2000:46-57. (戴宗坤,罗万伯.信息系统安全[M].北京:金城出版社,2000:46-57.) [7] PAN L. Dynamic evaluation model of security risk in information system[C]//ICCSEE2012:Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering. Washington, DC:IEEE Computer Society, 2012:225-229. [8] WANG B, XIAO L. The information system risks quantified model based on the rules of resources distribution[J]. Journal of Sichuan University:Engineering Science Edition, 2007, 39(6):129-133. (王标,肖龙.基于资源分布规律的信息系统风险量化模型[J].四川大学学报:工程科学版,2007,39(6):129-133.) [9] CHAN A H W, LYU M R. Security modeling and evaluation for the mobile code paradigm[C]//ASIAN99:Proceedings of the 5th Asian Computing Science Conference on Advances in Computing Science, LNCS 1742. Berlin:Springer, 1999:371-372. [10] MEADOWS C. The feasibility of quantitative assessment of security[M]//Dependable Computing for Critical Applications 4. Vienna:Springer, 1995, 9:227-228. |