[1]Noel S,Jacobs M,Kalapa P,et al. Multiple Coordinated Views for Network Attack Graphs[C]∥Proc of Visualization for Computer Security, 2005:1219.
[2]Noel S,Jajodia S.Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices[C]∥Proc of the IEEE Computer Security Applications Conference,2005:160169.
[3]Ammann P,Pamula J,Street J,et al.A HostBased Approach to Network Attack Chaining Analysis[C]∥Proc of the IEEE Computer Security Applications Conference,2005:7284.
[4]Zhang Tao,Hu MingZeng,Li Dong,et al.An Effective Method to Generate Attack Graph[C]∥Proc of the IEEE Machine Learning and Cybernetics,2005:39263931.
[5]Ray I, Poolsappasit N. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders[C]∥Proc of ESORICS’05, 2005:231246.
[6]Schneier B. Attack Trees: Modeling Security Threats[J].Dr Dobb's Journa1,1999,24(12):2129.
[7]Fung C,Chen YiLiang,Wang Xinyu,et al.Survivability Analysis of Distributed Systems Using Attack Tree Methodology[C]∥Proc of Military Communications Conference, 2005:17.
[8]Edge K S,Dalton G C,Raines R A. Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security[C]∥Proc of Military Communications Conference, 2006:17.
[9]Mcdermott J E.Attack Net Penetration Testing[C]∥Proc of the 2000 New Security Paradigms Workshop,2000:1522.
[10]Steffan J,Schumacher M.Collaborative Attack Modeling[C]∥Proc of the 2002 ACM Symp on Applied Computing,2002:253259.
[11]鲁智勇,冯超,余辉,等.网络安全性定量评估模型研究[J]. 计算机工程与科学,2009,31(10):1822. |