[1] 张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007, 30(2): 234-240. Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2): 234-240. [2] Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-651. [3] 王玉龙, 杨放春, 孙其博. 基于模型的网络脆弱性定量分析方法[J]. 北京邮电大学学报, 2008, 31(4): 58-61. Wang Yulong, Yang Fangchun, Sun Qibo. Model-based quantitative method of network vulnerability analysis[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(4): 58-61. [4] 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法. 软件学报, 2006, 17(4): 885-896. Chen Xiuzhen, Zheng Qinghua, Guan Xiaohong, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885-896. [5] 汤永利, 徐国爱, 钮心忻, 等. 基于信息熵的信息安全风险分析模型[J]. 北京邮电大学学报, 2008, 31(2): 50-53. Tang Yongli, Xu Guo'ai, Niu Xinxin, et al. Information security risk analysis model using information entropy[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(2): 50-53. [6] 严蔚敏, 吴伟民. 数据结构[M]. 北京:清华大学出版社, 2001. 156-158. [7] 甘早斌, 吴平, 路松峰, 等. 基于扩展攻击树的信息系统安全风险评估. 计算机应用研究, 2007, 24(11): 153-156. Gan Zaobin, Wu Ping, Lu Songfeng, et al. Information system security risk evaluation based on attack tree[J]. Journal of Application Research of Computers, 2007, 24(11): 153-156. [8] Evans S, Waller J. Risk-based security engineering through the eyes of the adversary//Proceedings of the 6th IEEE Systems, Man and Cybemetics Information Assurance Workshop. New York: IEEE Computer Society Press, 2005:158-165. |