[1] R Dewri, I Ray, N Poolsappasit, et al.Optimal security hardening on attack tree models of networks: a cost-benefit analysis[J]. International Journal of Information Security (S1615-5262), 2012, 11(3): 167-188. [2] 吴金宇, 金舒原, 杨智. 基于网络流的攻击图分析方法[J]. 计算机研究与发展,2011, 48(8): 1497-1505. [3] S Z Wang, Z H Zhang, Y Kadobayashi.Exploring attack graph for cost-benefit security hardening: A probabilistic approach[J]. Computers & Security (S0167-4048), 2013, 32(2): 158-169. [4] 吴迪, 冯登国, 连一峰, 等. 一种给定脆弱性环境下的安全措施效用评估模型[J]. 软件学报, 2012, 23(7): 1880-1898. [5] Wang Ling yu, S Noel, S Jajodia. Minimum-cost network hardening using attack graphs[J]. Computer Communications (S0140-3664), 2006, 29(18): 3812-3824. [6] S Jajodia, S Noel.Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response[M]. New Jersey, USA: World Scientific, 2009: 285-305. [7] Ma Jun-chun, Wang Yong-jun, Sun Ji-yin, et al.A Minimum Cost of Network Hardening Model Based on Attack Graphs[J]. Procedia Engineering (S1877-7058), 2011, 15: 3227-3233. [8] M Albanese, S Jajodia, S Noel.Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs[C]// Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, Boston, USA. USA: IEEE, 2012: 1-12. [9] 高翔, 祝跃飞, 刘胜利. 一种基于广义随机着色Petri 网的网络攻击组合模型[J]. 电子与信息学报, 2013, 35(11): 2608-2614. [10] 司加全, 张冰, 苘大鹏, 等. 基于攻击图的网络安全性增强策略制定方法[J]. 通信学报, 2009, 30(2): 123-128. [11] 林闯. 随机Petri网和系统性能评价 [M]. 北京: 清华大学出版社, 2005: 23-35. [12] N J Dingle, W J Knottenbelt, T Suto.PIPE2: A Tool for the Performance Evaluation of Generalized Stochastic Petri Nets[J]. ACM SIGMETRICS Performance Evaluation Review (S0163-5999), 2009, 36(4): 34-39. [13] Gao Xiang, Zhu Yuefei, Fei Jinlong, et al.Method Based on GSCPN for Network Vulnerability Analysis[J]. Journal of Software (S1796-217X), 2013, 8(8): 2032-2038. |