参考文献
[1]Cheung S,Lindqvist U,Fong M W.Modeling Multistep Cyber Attacks for Scenario Recognition[C]//Pro-ceedings of DARPA Information Survivability Con-ference and Exposition.Washington D.C.,USA:IEEE Press,2003:284-292.
[2]Wang L,Noel S,Jajodia S.Minimum-cost Network Hardening Using Attack Graphs[J].Computer Com-munications,2006,29(18):3812-3824.
(下转第143页)
(上接第137页)
[3]程叶霞,姜文,薛质,等.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49(Sl):23-31.
[4]陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.
[5]石进,郭山清.一种基于攻击图的入侵响应方法[J].软件学报,2008,19(10):2746-2753.
[6]Mehta V,Bartzis C,Zhu H,et al.Ranking Attack Graphs[C]//Proceedings of International Conference on Recent Advances in Intrusion Detection.Berlin,Germany:Springer-Verlag,2006:127-144.
[7]张少俊,李建华,宋姗姗,等.贝叶斯推理在攻击图节点置信度计算中的应用[J].软件学报,2010,21(9):2376-2386.
[8]牟琦,陈艺坤,毕孝儒,等.一种基于快速增量SVM的入侵检测方法[J].计算机工程,2012,38(12):92-94.
[9]Zheng Nan,Aaron P,Wang Haining.An Efficient User Verification System via Mouse Movement[C]//Proceedings of the 18th ACM Conference on Computer and Communications.New York,USA:ACM Press,2011:139-150.
[10]Poolsappasit N,Dewri R,Ray I.Danymic Security Risk Management Using Bayesian Attack Graphs[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):61-74.
[11]叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996.
[12]陈思思,连一峰,贾炜.基于贝叶斯网络的脆弱性状态评估方法[J].中国科学院研究生院学报,2008,25(5):639-648.
[13]徐德智,李小慧.基于云模型的项目评分预测推测算法[J].计算机工程,2010,36(17):48-50.
[14]马俊春,王勇军,孙继银,等.基于攻击图的网络安全评估方法研究[J].计算机应用研究,2012,29(3):1100-1106.
[15]Wang Lingyu,Tania I.An Attack Graph-based Probabilistic Security Metric[C]//Proceedings of the 13th ACM Conference of Computer and Communications Security.New York,USA:ACM Press,2006:336-345.
编辑刘冰 |