[1] Sheyner O, Haines J, Jha S. Automated generation and analysis of attack graphs//S&P '02. USA: IEEE Computer Society, 2002: 273-284. [2] Ou Xinming, Boyer W F, McQueen M A. A scalable approach to attack graph generation//CCS '06. Alexandria: ACM Press, 2006: 336-345. [3] Avizienis A, Laprie J, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(1): 11-33. [4] Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-650. [5] Pamula J, Ammann P. A weakest-adversary security metric for network configuration security analysis//QoP '06. Alexandria: ACM Press, 2006: 31-38. [6] Vardi Y, Zhang Cunhui. Measures of network vulnerability[J]. IEEE Signal Processing Letters, 2007, 14(5): 313-316. [7] 山秀明, 王磊, 任勇, 等. 互联网复杂性研究进展[J]. 北京邮电大学学报, 2006, 29(1): 1-8. Shan Xiuming, Wang Lei, Ren Yong, et al. A survey on the Internet complexity. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 1-8. [8] MITRE. Common vulnerabilities and exposures(CVE). . http://cve.mitre.org/. |