[1] 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17(4): 885-897. Chen Xiuzhen, Zheng Qinghua, Guan Xiaohong, et al. Quantitative hierarchical threat evaluation model for network security [J]. Journal of Software, 2006, 17(4): 885-897.[2] Liu Zhiming, Li Sheng, He Jin, et al. Complex network security analysis based on attack graph model[C]//2012 Instrumentation, Measurement, Computer, Communication and Control International Conference. Piscataway. [s.l.]: IEEE Press, 2012: 183-186.[3] GAL A. Managing uncertainty in schema matching with top-k schema mappings[J]. Journal on Data Semantics Ⅳ, 2006, 4(9): 90-114.[4] 陈丽莎. 大规模网络安全态势评估模型研究[D]. 成都: 电子科技大学, 2008.[5] 国务院. 国家突发公共事件总体应急预案[M]. 北京: 中国法制出版社, 2006. The State Council of the People's Republic of China. A overall emergency plans of national public event[M]. Beijing: China Legal Press, 2006.[6] 柳小桐. BP神经网络输入层数据归一化研究[J]. 机械工程与自动化, 2010, 10(3): 122-123. Liu Xiaotong. Study ondata normalization in BP neural network[J]. Mechanical Engineering & Automation, 2010, 10(3): 122-123. |