[1] 郝选文. 空间信息网抗毁路由及网络防安全威胁技术研究[D]. 西安: 西安电子科技大学, 2013.Hao Xuanwen. Research on Survivalbility Routing and Anti-Attack Technology in Space Information Networks[D]. Xi’an: Xidian University, 2013. [2] 陈娟, 马涛. 无线网络攻击分类技术研究[J]. 电子科技, 2011, 24(3): 118-121. Chen Juan, Ma Tao. The Study of the Wireless Network Attack Classification Technology[J]. Electronic Science and Technology, 2011, 24(3): 118-121. [3] 瞿鑫. 关于IP网络性能指标及其测试方法分析[J]. 中国新通信, 2014, 16(23): 113. Qu Xin. IP network performance index and analysis on test method [J]. China New Telecommunications, 2014, 16(23): 113. [4] 郑雄, 王懿, 张顺颐. IP网络性能指标及其测试方法的研究[J]. 中国数据通信, 2004, 5(11): 21-25. Zheng Xiong, Wang Yi, Zhang Shunyi. IP network performance and study on test methods [J]. China Data Communications Net, 2004, 5(11): 21-25. [5] 李雄伟. 基于性能分析的网络安全威胁效果评估方法研究[J]. 电子对抗技术, 2005, 20(3): 39-42. Li Xiongwei. Study on the Evaluation Methods of the Attack Effect of Network Based on Performance Analysi[J].Electronic Warfare Technology, 2005, 20(3): 39-42 [6] 朱辰, 董银虎. 基于OPNET的网络仿真技术研究及其应用[J]. 无线电工程, 2013, 43(3): 12-15. Zhu Chen, Dong Yinhu. Network Simulation Technology and Its Application Based on OPNET[J]. Radio Engineering, 2013, 43(3): 12-15. [7] Sethi A S, Hnatyshin V Y.The Practical OPNET User Guide for Computer Network Simulation[M]. CRC Press, 2012. [8] 高志华, 孙媛, 李季颖, 等. 基于排队论的网络化要地防空作战效能研究[J]. 计算机与数字工程, 2012, 40(8): 51-54. Gao Zhihua, Sun Yuan, Li Jiying, et al. Study of Operational Effectiveness for Networking Essential Air Defense Based on Queuing Theory[J]. Computer & Digital Engineering, 2012, 40(8): 51-54. [9] 赵华琼, 唐学文. 基于模糊层次分析法的网络业务性能评估模型[J]. 计算机应用, 2013, 33(11): 3035-3038. Zhao Huaqiong, Tang Xuewen. Evaluation model of network service performance based on fuzzy analytic hierarchy process[J]. Journal of Computer Applications, 2013, 33(11): 3035-3038. [10] Lambert-Torres G, De Almeida Costa C I, Neto M C B, et al. Decision-making using a Paraconsistent analytic hierarchy process[C]//2008 5th International Conference on the European Electricity Market, 2008. [11] 李雄伟, 于明, 杨义先, 等. Fuzzy-AHP法在网络攻击效果评估中的应用[J]. 北京邮电大学学报, 2006, 29(1): 124-127. Li Xiongwei, Yu Ming, Yang Yixian, et al. Application of Fuzzy-AHP Method in the Effect Evaluation of Network Attack[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 124-127. [12] Cao Y, Zhang L, Wu H.An evaluation system for network attack effect based on fuzzy[C]//E-Business and Information System Security. IEEE, 2009: 1-5. [13] 王会梅, 江亮, 鲜明, 等. 计算机网络安全威胁效果灰色评估模型和算法[J]. 通信学报, 2009, 30(11): 17-22. Wang Huimei, Jiang Liang, Xian Ming, et al. Grey evaluation model and algorithm of network attack effectiveness[J]. Journal on Communications, 2009, 30(11): 17-22. [14] 赵博夫, 殷肖川, 吴传芝. 基于灰色理论的安全威胁者安全威胁能力评估[J]. 计算机工程, 2011, 37(14): 114-117. Zhao Bofu, Yin Xiaochuan, Wu Chuanzhi. Attack Ability Evaluation of Attackers Based on Grey Theory[J]. Computer Engineering, 2011, 37(14): 114-117. |