参考文献
[1]Tsay J K,Mjlsnes S.Computational Security Analysis of the UMTS and LTE Authentication and Key Agree-ment Protocols[J].Computer Science,2013,360(12):12-17.
[2]国家计算机网络应急技术处理协调中心.2011年中国互联网网络安全态势报告[EB/OL].(2012-03-20).http://www.cert.org.cn/publish/main/46/index.html.
[3]中国互联网协会.《中国互联网站发展状况及其安全报告(2015)》发布[EB/OL].(2015-03-20).http://www.cac.gov.cn/2015-03/20/c_1114714197.htm.
[4]陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848.
[5]Chinchani R,Upadhyaya S,Kwiat K.Towards the Scalable Implementation of a User Level Anomaly Detection System[C]//Proceedings of MILCOM’02.Washington D.C.,USA:IEEE Press,2002:1503-1508.
[6]王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355.
[7]Yu Liu,Hong Man.Network Vulnerability Assessment Using Bayesian Networks[J].Proceedings of SPIE,2005,5812:61-71.
[8]Frigault M,Wang L,Singhal A,et al.Measuring Network Security Using Dynamic Bayesian Network[C]//Pro-ceedings of ACM Workshop on Quality of Protection.New York,USA:ACM Press,2008:23-30.
[9]石进,郭山清.一种基于攻击图的入侵响应方法[J].软件学报,2008,19(10):2746-2753.
[10]Homer J,Ou X,Schmidt D.A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks[EB/OL].[2015-10-11].http://people.cs.ksu.edu/~xou/publications/tr_homer_0809.pdf.
[11]张少俊,李建华,宋珊珊,等.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386.
[12]Publishing S.A Novel Attack Graph Posterior Inference Model Based on Bayesian Network[J].Journal of Information Security,2011,2(1):8-27.
[13]Wang Shuzhen,Zhang Zonghua,Kadobayashi Y.Exploring Attack Graph for Cost-benefit Security Hardening:A Probabilistic Approach[J].Computers & Security,2013,32(1):158-169.
[14]吴泓润,覃俊,郑波尽.基于代价的复杂网络抗攻击性研究[J].计算机科学,2012,39(8):224-227.
[15]杨健,高文逸,刘军.一种基于贝叶斯网络的威胁估计方法[J].解放军理工大学学报(自然科学版),2010,11(1):43-48.
[16]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.
编辑金胡考 |