[1] 钟尚勤, 徐国胜, 姚文斌, 等. 基于主机安全组划分的网络安全性分析[J]. 北京邮电大学学报, 2012, 35(1): 19-23. Zhong Shangqin, Xu Guosheng, Yao Wenbin et al. Network security analysis based on host-security-group [J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(1): 19-23.[2] Sheyner O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs [C]//Proceedings 2002 IEEE Symposium on Security and privacy, 2002: 273-284.[3] 龙门, 夏靖波, 张子阳, 等. 节点相关的隐马尔可夫模型的网络安全评估[J]. 北京邮电大学学报, 2011, 33(6): 121-124. Long Men, Xia Jingbo, Zhang Ziyang, et al. Network security assessment based on node correlated HMM [J]. Journal of Beijing University of Posts and Telecommunications, 2011, 33(6): 121-124.[4] 陈锋, 张怡. 基于攻击图的网络脆弱性量化评估研究[J]. 计算机工程与科学, 2010, 32(10): 8-11. Chen Feng, Zhang Yi. Research of quantitative vulnerability assessment based on attack graphs [J]. Computer Engineering & Science, 2010, 32(10): 8-11.[5] 陈思思, 连一峰, 贾炜. 基于贝叶斯网络的脆弱性状态评估方法[J]. 中国科学院研究生院学报, 2008, 25(5): 639-648. Chen Sisi, Lian Yifeng, Jia Wei. A network vulnerability evaluation method based on Bayesian networks [J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2008, 25(5): 639-648.[6] 方研, 殷肖川, 李景志. 基于贝叶斯攻击图的网络安全量化评估研究[J]. 计算机应用研究, 2013, 30(9): 2763-2766. Fang Yan, Yin Xiaochuan, Li Jingzhi. Research of quantitative network security assessment based on Bayesian-attack graphs [J]. Application Research of Computers, 2013, 30(9): 2763-2766.[7] Wang Lingyu, Yao Chao, Singhal A, et al. Interactive analysis of attack graphs using relational queries [M]. Data and Applications Security XX: Springer Berlin Heidelberg, 2006: 119-132.[8] 贾炜. 计算机网络脆弱性评估方法研究[D]. 合肥: 中国科学技术大学, 2012. Jia Wei. The research on computer network vulnerabilities assessment methods [D]. Hefei: University of Science and Technology of China, 2012.[9] Poolsappasit N, Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs[J]. Dependable and Secure Computing, IEEE Transactions on, 2012, 9(1): 61-74.[10] 叶云, 徐锡山. 基于攻击图的网络安全概率计算方法[J]. 计算机学报, 2010 (10): 1987- 1996. Ye Yun, Xu Xishan. An attack graph based probabilistic computing approach of network security [J]. Chinese Journal of computers, 2010 (10): 1987-1996. |