[1]Hollway A, Neuman G. Survivable computer communication systems:The problem and working group recommendations[R]. Washington:US Army Research Laboratory, 1993.
[2]Wang Zhigang, Yang Shisong. Information network system survivability evaluation based on fuzzy comprehensive evaluation[J]. Network Security Technology & Application, 2010(10):5860.(in Chinese)
[3]Yang Hua, Lu Xinghua, Liu Yun. Survivability analysis of survivable network info system[J]. Microcomputer Information, 2009,25(13):141143.(in Chinese)
[4]Zhang Yi, Huo Shanshan. Quantitative assessment of survivability of network storage systems[J]. Journal of Tsinghua University(Science and Technology),2009,49(S2):21192125.(in Chinese)
[5]Wang Jian, Wang Huiqiang, Zhao Guosheng. Index system of quantitative evaluation for information systems survivability[J]. Computer Engineering, 2009,35(3):5456.(in Chinese)
[6]Bo Bin.Network system framework of survivability and quantitative evaluation of network survivability[D]. Chengdu:College of Electronic Technology, 2010.(in Chinese)
[7]Kant L, Chen W. Service survivability in wireless networks via multi—layer selfhealing[C]∥Proc of 2005 IEEE Wireless Communications and Networking Conference,2005:24462452.
[8]Wang H Q, Liu D X, Xu D, et al.A holistic approach to survivable distributed information system for critical applications[C]∥Proc of ISPA’2005,2005:713724.
[9]Lin Chuang,Peng Xuehai.Research on trustworthy networks[J]. Chinese Journal of Computers, 2005,28(5):751758.(in Chinese)
[10]Huang Zunguo, Lu Xicheng, Hu Huaping. The survivability technique and its implementation case study[J]. Journal of China Institute of Communications, 2004,25(7):137145.(in Chinese)
[11]Cai Junping, Xiao Zhiting, Li Xuedong. Survivability evaluation of military information networks based on cloud model[J]. Journal of Wuhan University of Technology, 2010,32(20):1115.(in Chinese)
[12]Liang Xiao, Meng Xiangru, Zhuang Xuchun, et al. Strategy selection model for network survivability based on stochastic game[J]. Journal of Computer Applications, 2012,32(9):26092612.(in Chinese)
[13]Wu Lianggang, Gao Yang, Zhang Jinlong. Research for methods determining the weights of case characteristics[J]. Systems EngineeringTheory &Practice, 2000(10):8992.(in Chinese)
附中文参考文献:
[2]王志刚, 杨世松. 基于模糊综合评价的信息网络系统可生存性评估[J]. 网络安全技术与应用, 2010(10):5860.
[3]杨桦, 卢兴华, 刘云. 生存性网络信息系统生存能力分析[J]. 微计算机信息, 2009,25(13):141143.
[4]张益, 霍珊珊. 网络存储系统可生存性量化评估[J]. 清华大学学报, 2009,49(S2):21192125.
[5]王健, 王慧强, 赵国生. 信息系统可生存性定量评估的指标体系[J]. 计算机工程, 2009,35(3):5456.
[6]柏彬. 可生存性网络系统框架及网络可生存性量化评估[D]. 成都:电子科技大学, 2010.
[9]林闯, 彭雪海.可信网络研究[J].计算机学报,2005,28(5):751758.
[10]黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报,2004,25(7):137145.
[11]蔡均平, 肖治庭, 李雪冬. 基于云模型的军事信息网络可生存性评估[J]. 武汉理工大学学报, 2010,32(20):1115.
[12]梁霄, 孟相如, 庄绪春等. 基于随机博弈的网络可生存性策略选择模型[J]. 计算机应用, 2012,32(9):26092612.
[13]吴良刚, 高阳, 张金隆. 确定事例特征权值的方法研究[J]. 系统工程理论与实践, 2000(10):8992. |