[1] Ge Haihui, Gu Lize, Yang Yixian, et al. An attack graph based network security evaluation model for hierarchical network[C]//Yixian Yang. Proceedings 2010 IEEE International Conference on Information Theory and Information Security. Beijing: IEEE Press, 2010: 208-211.[2] Li Kai, Gu Naijie, Bi Kun, et al. Network security evaluation algorithm based on access level vector[C]//The 9th International Conerence for Young Computer Scientists. Hunan:[s.n.], 2008: 1538-1544.[3] 张利, 姚轶崭, 彭建芬, 等. 基于决策树的智能信息安全风险评估方法[J]. 清华大学学报: 自然科学版, 2011, 51(10): 1236-1239. Zhang Li, Yao Yizhan, Peng Jianfen, et al. Intelligent information security risk assessment based on a decision tree algorithm[J]. Journal of Tsing hua University: Science and Technology, 2011, 51(10): 1236-1239.[4] Niu Honghui, Shang Yanling. Research on risk assessment model of information security based on Particle swarm algorithm-RBF neural network[C]//Circuits, Communications and System(PACCS). Beijing:[s.n.], 2010: 479-482.[5] Qu Zhiming. Application of comprehensive fuzzy evaluation in enterprise network security[C]//Power Electronics and Intelligent Transportation System(PEITS). Shenzhen:[s.n.], 2009: 54-57.[6] 吕镇邦, 周波. 基于Shapley熵和Choquet积分的层次化风险评估[J]. 北京邮电大学学报, 2009, 32(6): 83-87. Lü Zhenbang, Zhou Bo. Hierarchical risk assessment based on shapley entropies and choquet integrals[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(6): 83-87.[7] 赵冬梅, 马建峰, 王跃生. 信息系统的模糊风险评估模型[J]. 通信学报, 2007, 28(4): 51-64. Zhao Dongmei, Ma Jianfeng, Wang Yuesheng. Model of fuzzy risk assessment of the information system[J]. Journal on Communications, 2007, 28(4): 51-64. |