[1] 刘晶, 伏飞, 戴江山, 等. 一种基于动态建链推理的网络攻击过程分析方法[J]. 电子科技大学学报, 2006, 35(5): 819-822. Liu Jing, Fu Fei, Dai Jiangshan, et al. A method of the network attack process analysis based on dynamic linking inference[J]. Journal of University of Electronic Science and Technology of China, 2006, 35(5): 819-822. [2] Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances//Proceedings of the 20th Annual Computer Security Applications Conference. : IEEE Computer Society, 2004: 350-359. [3] Wang Lingyu, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Data and Applications Security 2007. Heidelberg: Springer, 2007: 98-112. [4] Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D C: ACM Press, 2002: 217-224. [5] 张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007, 30(2): 234-240. Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2): 234-240. [6] Chen Feng, Su Jinshu. A flexible approach to measuring network security using attack graphs//2008 International Symposium on Electronic Commerce and Security. Guangzhou: IEEE Computer Society, 2008: 426-431. [7] 刘芳. 信息系统安全评估理论及其关键技术研究. 长沙: 国防科学技术大学, 2005. [8] 邓新颖, 杨庚, 姚放吾, 等. 基于多阶段网络攻击的网络风险评估方法研究[J]. 计算机工程与应用, 2006, 42(18): 133-135, 203. Deng Xinying, Yang Geng, Yao Fangwu, et al. A network risk assessment method based on multi-stage network attack[J]. Computer Engineering and Applications, 2006, 42(18):133-135, 203. |