(下转第198页)
(上接第191页)
[1]2016年中国互联网安全报告[EB/OL].[2016-11-21].http://www.cert.org.cn/publish/main/46/index.html.br/
[2]高妮,高岭,贺毅岳,等.基于贝叶斯攻击图的动态安全风险评估模型[J].四川大学学报(工程科学版),2016,48(1):111-118.br/
[3]苘大鹏,张冰,周渊,等.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452.br/
[4]GHASEMIGOL M,GHAEMI-BAFGHI A,TAKABI H.A comprehensive approach for network attack foreca-sting[J].Computers and Security,2016,58(1):83-105.br/
[5]彭武,胡昌振,姚淑萍.基于攻击路径图的入侵意图识别[J].北京理工大学学报,2010,30(9):1077-1081.br/
[6]KAYNAR K.A taxonomy for attack graph and usage in network security[J].Information Security and Applications,2016,29(1):27-56.br/
[7]LV Huiying,ZHANG Yuan,WANG Jie.Network threat identification and analysis based on a state transition graph[J].Cybernetics & Information Technologies,2013(13):51-61.br/
[8]POOLSAPPASIT N,DEWRI R,RAY I.Dynamic security risk management using bayesian attack graphic[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):61-74.br/
[9]QIU Hui,WANG Kun.Real-time network attack intention recognition algorithm[J].International Journal of Security and Its Applications,2016,10(4):51-62.br/
[10]CHANDRAN R,YAN W.Attack graph analysis for network anti-forensics[J].International Journal of Digital Crime & Forensics,2014,6(1):28-50.br/
[11]KAYNAR K,SIVRIKAYA F.Distributed attack graph generation[J].IEEE Transactions on Dependable and Secure Computing,2016,13(5):519-532.br/
[12]YE Yun,XU Xishan,JIA Yan,et al.An attack graph-based probabilistic computing approach of network security[J].Chinese Journal of Computers,2010,33(10):1987-1996.br/
[13]贺志强,楼芳,李亮.基于攻击距离的攻击图优化方法[J].计算机工程与科学,2012,34(2):9-12.br/
[14]陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.br/
[15]吴泓润,覃俊,郑波尽.基于代价的复杂网络抗攻击性研究[J].计算机科学,2012,39(8):224-227.br/ |