[1] Kumar K, Joshir C, Singh K. A distributed approach using entropy to detect DDoS attacks in ISP domain[C]// International Conference on Signal Processing, Communications and Networking. New York: IEEE Press, 2007: 331-337.
[2] 汤永利, 徐国爱, 钮心忻,等. 基于信息熵的信息安全风险分析模型[J]. 北京邮电大学学报, 2008, 31(2): 50-53. Tang Yongli, Xu Guoai, Niu Xinxin,et al. Information security risk analysis model using information entropy[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(2): 50-53.
[3] 陈娟, 马涛. 移动Ad Hoc网络DoS攻击效果评估方法[J]. 电光与控制, 2012, 19(3): 86-89. Chen Juan, Ma Tao. DoS attack effect assessment method in mobile Ad Hoc network [J]. Electronics Optics & Control, 2012, 19(3): 86-89.
[4] 吴焕, 潘林, 王晓箴,等. 应用不完整攻击图分析的风险评估模型[J]. 北京邮电大学学报, 2010, 33(3): 57-61. Wu Huan, Pan Lin, Wang Xiaozhen,et al. A risk assessment model using incomplete attack graphs analysis[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 57-61
[5] 刘玉玲, 冯登国, 吴丽辉, 等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012, 23(3):712-723. Liu Yuling, Feng Dengguo, Wu Lihui, et al. Performance evaluation of worm attack and defense strategies based on static bayesian game[J]. Journal of Software, 2012, 23(3):712-723
[6] 王元卓, 林闯, 程学旗, 等. 基于随机博弈模型的网络攻防量化分析[J]. 计算机学报, 2010, 33(9): 1748-1762. Wang Yuanzhuo, Lin Chuang, Cheng Xueqi, et al. Analysis for Network Attack-Defense Based on Stochastic Game Model[J]. Chinese Journal of Computers. 2010, 33(9): 1748-1762.
[7] 叶云, 徐锡山, 贾焰, 等. 基于攻击图的网络安全概率计算方法[J]. 计算机学报, 2010, 33(10): 1987-1996. Ye Yun, Xu Xishan, Jia Yan, et al. An attack graph-based probabilistic computing approach of network security[J]. Chinese Journal of Computers, 2010, 33(10): 1987-1996.
[8] 吴迪, 冯登国, 连一峰, 等. 一种给定脆弱性环境下的安全措施效用评估模型[J]. 软件学报, 2012, 23(7): 1880-1898. Wu Di, Feng Dengguo, Lian Yifeng, et al. Efficiency evaluation model of system security measures in the given vulnerabilities set[J]. Journal of Software, 2012, 23(7): 1880-1898. |