[1] |
LIPPMANN R P , FRIED D J , GRAF I ,et al. Evaluating intrusion detection systems:the 1998 DARPA off-line intrusion detection evaluation[C]// DARPA Information Survivability Conference and Exposition(DISCEX'00). 2000: 12-26.
|
[2] |
HERRMANN D S . Using the common criteria for IT security evaluation[M]. Florida: CRC PressPress, 2002.
|
[3] |
HAN L M Q . Analysis and study on AHP-fuzzy comprehensive evaluation[J]. China Safety Science Journal, 1983.
|
[4] |
FUNG C , CHEN Y L , WANG X ,et al. Survivability analysis of distributed systems using attack tree methodology[C]// Military Communications Conference. 2005: 583-589.
|
[5] |
CHAPMAN C B , COOPER D F . Risk engineering:basic controlled interval and memory models[J]. Journal of the Operational Research Society, 1983,34(1): 51-60.
|
[6] |
SAATY L . How to make a decision:the analytic hierarchy process[J]. European Journal of Operational Research, 1990,48(1): 9-26.
|
[7] |
PETTERSSON J . A study on software management approaches:proposing a project support tool[J]. University West Library, 2003.
|
[8] |
VAN-HOLSTEIJN F A . The motivation of attackers in attack tree analysis[J]. TU Delft Library, 2015.
|
[9] |
ZHANG X , BAI Y , LV L . Application of the controlled interval and memory model in the risk assessment of city gas transmission and distribution networks[C]// The International Conference on Pipelines and Trenchless Technology. 2012.
|
[10] |
GONG Y , MABU S , CHEN C ,et al. Intrusion detection system combining misuse detection and anomaly detection using genetic network programming[C]// Iccas-Sice. 2009: 3463-3467.
|