参考文献
[1]PHILLIPS C,SWILER L.A Graph-based System for Network Vulnerability Analysis[C]//Proceedings of the 7th Workshop on New Security Paradigms.New York,USA:ACM Press,1998:71-79.
[2]SHEYNER O.Scenario Graphs and Attack Graphs[D].Pittsburgh,USA:Carnegie Mellon University,2004.
[3]苘大鹏,张冰,周渊,等.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452.
[4]GHOSH N,GHOSH S K.A Planner-based Approach to Generate and Analyze Minimal Attack Graph[J].Applied Intelligence,2012,36(2):369-390.
[5]宋舜宏,陆余良,夏阳,等.基于贪心策略的网络攻击图生成方法[J].计算机工程,2011,37(2):126-128.
[6]朱明,殷建平,程杰仁,等.基于贪心策略的多目标攻击图生成方法[J].计算机工程与科学,2010,32(6):22-25.
[7]陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848.
[8]AMMANN P,WIJESEKERA D,KAUSHIK S.Scalable Graph-based Network Vulnerability Analysis[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2002:217-224.
[9]陈锋.基于多目标攻击图的层次化网络安全风险评估方法研究[D].长沙:国防科学技术大学,2009.
[10]赵豹.基于攻击图的网络脆弱性分析技术研究[D].长沙:国防科学技术大学,2009.
[11]叶云,徐锡山,齐治昌,等.大规模网络中攻击图自动构建算法研究[J].计算机研究与发展,2013,50(10):2133-2139.
(下转第165页)
(上接第155页)
[12]FORGY C L.Rete:A Fast Algorithm for the Many Pattern /Many Object Pattern Match Problem[J].Artificial Intelligence,1982,19(1):17-37.
[13]庞伟正,金瑞琪,王成武.一种规则引擎的实现方法[J].哈尔滨工程大学学报,2005,26(3):385-389.
[14]CALIFF M E,MOONEY R J.Relational Learning of Pattern-match Rules for Information Extraction[C]//Proceedings of the 16th National Conference on Artificial Intelligence and the 11th Innovative Applications of Artificial Intelligence Conference.[S.l.]:American Association for Artificial Intelligence,2002:328-334.
[15]LEI Feng,WANG Jianqiang.Research on the WSN Intrusion Detection System Based on Improved BM Pattern Match Algorithm[J].Journal of Convergence Information Technology,2012,7(17):109-115.
[16]OU Xinming,BOYER W,MCQUEEN M.A Scalable Approach to Attack Graph Generation[C]//Proceedings of the 13th ACM Conference on Computer and Communication Security.New York,USA:ACM Press,2006:336-345.
编辑顾逸斐 |