[1] |
吴迪, 冯登国, 连一峰 ,等. 一种给定脆弱性环境下的安全措施效用评估模型[J]. 软件学报, 2012,23(7): 1880-1898.
|
|
WU D , FENG D G , LIAN Y F ,et al. Efficiency evaluation model of system security measures in the given vulnerabilities set[J]. Journal of Software. 2012,23(7): 1880-1898.
|
[2] |
MAIO F D , MASCHERONA Z E . Risk analysis of cyber-physical systems by GTST-MLD[J]. IEEE Systems Journal, 2020,14(1): 1333-1340.
|
[3] |
LEE J , MOON D , KIM I ,et al. A semantic approach to improving machine readability of a large-scale attack graph[J]. The Journal of Supercomputing, 2018.
|
[4] |
SCARFONE K , MELL P . An analysis of CVSS version 2 vulnerability scoring[J]. IEEE Computer Society, 2009.
|
[5] |
KERAMATI M , AKBARI A . CVSS-based security metrics for quantitative analysis of attack graphs[C]// 2013 3th International Conference on Computer and Knowledge Engineering (ICCKE). 2013.
|
[6] |
KHOUZANI M , LIU Z , MALACARIA P . Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs[J]. European Journal of Operational Research, 2019.
|
[7] |
LIU X G . A network attack path prediction method using attack graph[J]. Journal of Ambient Intelligence and Humanized Computing, 2020,(1): 1-8.
|
[8] |
ZANG T , GAO S , LIU B ,et al. Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks[J]. Reliability Engineering & System Safety, 2019,189(SEP.): 232-241.
|
[9] |
OBERT J , CHAVEZ A . Graph theory and classifying security events in grid security gateways[J]. International Journal of Semantic Computing, 2020,14(1): 93-105.
|
[10] |
陈锋, 张怡, 苏金树 ,等. 攻击图的两种形式化分析[J]. 软件学报, 2010,21(4): 838-848.
|
|
CHEN F , ZHANG Y , SU J S ,et al. Two formal analyses of attack graphs[J]. Journal of Software, 2010,21(4): 838-848.
|
[11] |
SHEYNER O , HAINES J , JHA S ,et al. Automated generation and analysis of attack graphs[C]// IEEE Symposium on Security & Privacy. 2002.
|
[12] |
INGOLSK , CHU M , LIPPMANN R ,et al. Modeling modern network attacks and countermeasures using attack graphs[R]. 2009.
|
[13] |
马春光, 汪诚弘, 张东红 ,等. 一种基于攻击意愿分析的网络风险动态评估模型[J]. 计算机研究与发展, 2015,52(9): 2056-2068.
|
|
MA C G , WANG C H , ZHANG D H ,et al. A dynamic network risk assessment model based on attacker’s inclination[J]. Journal of Computer Research and Development. 2015,52(9): 2056-2068.
|
[14] |
闫峰 . 基于攻击图的网络安全风险评估技术研究[D]. 长春:吉林大学, 2014.
|
|
YAN F . The technology research of network security risk assessment based on attacks graphs[D]. Changchun:Jilin University, 2014.
|
[15] |
ZHANG S , SONG S . A novel attack graph posterior inference model based on bayesian network[J]. Journal of Information Security, 2011,2(1): 8-27.
|
[16] |
WANG L , LIU A , JAJODIA S . Using attack graphs for correlating,hypothesizing,and predicting intrusion alerts[J]. Computer Communications, 2006,29(15): 2917-2933.
|
[17] |
周余阳, 程光, 郭春生 . 基于贝叶斯攻击图的网络攻击面风险评估方法[J]. 网络与信息安全学报, 2018,4(6): 11-22.
|
|
ZHOU Y Y , CHENG G , GUO C S . Risk assessment method for network attack surface based on Bayesian attack graph[J]. Chinese Journal of Network and Information Security, 2018,4(6): 11-22.
|
[18] |
LALLIE H S , DEBATTISTAK , BAL J . Evaluating practitioner cyber-security attack graph configuration preferences[J]. Computers & Security, 2018,79: 117-131.
|
[19] |
LIN P , CHEN Y . Dynamic network security situation prediction based on bayesian attack graph and big data[C]// 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC). 2018.
|