[1] US Department of Energy. Idaho National Laboratory [R/OL]. (2014-02-01) [2014-03-10]. htp://portal.inl.gov /portal/ serverptcommunity/ national and_ homeland security/273/critical infrastructure_ protection. [2] Zi-an T.指挥自动化网络的安全仿真分析[J].计算机工程, 2013, 39(10): 151-155, 161. [3] 孔红山,唐俊,张明清,基于SITL的网络攻防仿真平台的设计与实现[J].计算机应用研究, 2011, 28(7) : 2715-2718. [4] C C Zou, w Gong, D Towsley. Code Red Worm Propagation Modeling and Analysis [M]// Proceedings ofCcs, 2002. USA: ACM, 2002: 138-147. [5] Z Shen, L Gao, K Kwiat. Modeling the Spread of Active Worms [M]// Proceedings of IEEE INFOCOM, 2003. USA: IEEE, 2003. [6] George F Riley. The Georgia Tech Network Simulator [C]// Proceedings of the ACM SIGCOMM Worksbop on Models, Methods and Tools for Reproducible Network Research. USA: ACM Press, 2003: 5-12. [7] USC Informnation Sciences Institute. NS-2 network simulator [R/OL]. (2014-02-20) [2014-03-10]. htp://www. isi.edu/nsnam/ns/doc/nsl_ _doc.pdf,last accessed on 07/15/ 2008. [8] Scalable Network Technologies Inc. Qualnet. R/OL]. (2014 03-01) [2014-03-10]. ht://ww.scalablonctworoks.com. [9] University of Utah. Network Emulation Testbed [R/OL]. (2014-02-10) [2014-03-10]. htp:/ww emulab.net/. [10] USC Information Sciences Institute and University of Uah. Cyber-Security Experimentation and Testing Facility [R/OL] (2014-02-10) [2014-03-10]. htp://wwisi. deterlab.net/. [11] 汪在荣,刘益和.基于关联规则的网络安全仿真研究[J].计算机仿真, 2012, 28(11): 130-133. [12] 刘涛,聂晓峰,荆继武,等.基于小型对象分配技术的GTNetS蠕虫仿真内存管理[J].中国科学院研究生院学报,2012, 29(1): 131-135. [13] Innacio J Martinez-Moyano,Stephen H. Conrad, David F. Andersen.Modeling behavioral considerations rclated to information sccurity [J]. Computers and Secunity: (S0302-9743), 2011, 30(6-7): 397-409. [14] S Schmidt, R Byc, J Chinnow. Application-level simulation for network sccurity [J]. Simulation Simulation Intermational (S 0037-5497), 2010, 86(5-6);: 311-330. [15] Grunewald D, Litzenberger M, Chinnow J Agent-based Network Security Simulation (Demonstration) [C]// Proc.of 10th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2011), Tumer, Yolum,Sonenberg and Stone (eds), May, 2-6, 2011, Taipei,Taiwan, China. County of Ricbland, State of South Carolina: Intemational Foundation for Autonomous Agents and Muliagent Systems Richland, SC, 2011 :1325-1326. [16] 王甲生,吴晓平,陈永强.不同信息条件下加权复杂网络抗毁性仿真研究[J]中南大学学报(自然科学: 版), 2013, 44(5): 1888-1894. [17] 谢丰,程苏琦,陈冬青,等.基于级联失效的复杂网络抗毁性[J]. 清华大学学报:自然科学版,2011, 51(10): 1252-1257. |