[1]Gao Lin ,Yang Jian-ye, Qin Gui-min. Methods for pattern mining in dynamic networks and applications[J]. Journal of Software,2013,24(9):2042-2061.(in Chinese)
[2]Xing Xu-jia,Lin Chuang.A survey of computer vulnerability assessment[J].Chinese Journal of Computers,2004,27(1):1-11.(in Chinese)
[3]Ammann P,Wijesekera D,Kaushik S.Scalable,graph based network vulnerability analysis[C]∥Proc of the 9th ACM Conference on Computer and Communications Security,2002:217-224.
[4]Sheyner O,Haines J W,Jha S,et al.Automated generation and analysis of attack graphs[C]∥Proc of the 2002 IEEE Symposium on Security and Privacy, 2002:273-284.doi:10.1109/SECPRI.2002.1004377.
[5]Chen Xiu-zheng, Zheng Qing-hua, Guan Xiao-hong, et al. Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,2006,17(4):885-897.(in Chinese)
[6]He Hui,Zhang Hong-li,Wang Xing,et al. Detriment quantitative assessment of the network security incident[J].Journal of Harbin Institute of Technology,2012,44(5):66-70.(in Chinese)
[7]Palla G,Barabási A L,Vicsek T.Quantifying social group evolution[J]. Nature,2007,446(7136):664-667.doi:10.1038/nature05670.
[8]Berger-Wolf T Y,Saia J.A framework for analysis of dynamic social networks[C]∥Proc of the KDD 2006,2006:523-528.
[9]Zhang Shao-jun, Li Jian-hua, Song Shan-shan, et al. Using Bayesian inference for computing attack graph node beliefs[J].Journal of Software,2010,21(9):2376-2386.(in Chinese)
[10]Ye Yun, Xu Xi-shan, Yia Yan. An attack graph-based probabilistic computing approach of network security [J].Chinese Journal of Computers,2010,33(10):1987-1996.(in Chinese)
[11]Cheng Xiao-jun, Fang Bin-xing, Tan Qing-feng, et al. Inferring attack intent of malicious insider based on probabilistic attack graph model [J].Chinese Journal of Computers,2014,37(1):62-72.(in Chinese)
[12]Schneier B.Secrets and lies: Digital security in a networked world[M].New York:John Wiley & Sons,2000.
[13]Dacier M.Towards quantitative evaluation of computer security[D].Toulouse:Institut National Polytechnique de Toulouse,1994.
[14]Porras P A,Kemmerer R.A penetration state transition analysis:A rule-based intrusion detection approach[C]∥Proc of the 8th Annual Computer Security Applications Conference,1992:220-229.
[15]Wang Yong-jie,Xian Ming,Liu Jin,et al.Study of network security evaluation based on attack graph model[J].Journal on Communications,2007,28(3):29-34.(in Chinese)
[16]Bollinger J A.Bollinger on bollinger bands[M].New York:McGraw-Hill,2001.
附中文参考文献:
[1]高琳,杨建业,覃桂敏.动态网络模式挖掘方法及其应用[J].软件学报,2013,24(9):2042-2061.
[2]邢栩嘉,林闯.计算机系统脆弱点评估研究[J].计算机学报,2004,27(1):1-11.
[5]陈秀真,郑庆华,管晓宏,等,层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.
[6]何慧,张宏莉,王星,等.网络安全事件危害度的量化评估[J].哈尔滨工业大学学报,2012,44(5):66-70.
[9]张少俊,李建华,宋珊珊,等.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386.
[10]叶云,徐锡山,贾焰.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996.
[11]陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.
[15]王永杰,鲜明,刘进,等.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. |