[1] |
程东年, 汪斌强, 王保进 等. 网络结构自调整的柔性内涵初探[J]. 通信学报, 2012,8(33):214-222. CHENG D N , WANG B Q , WANG B J , et al. Preliminary study on the connotation of flexibility in dynamically reconfigurable networks[J]. Journal on Communications, 2012,8(33):214-222.
|
[2] |
兰巨龙, 邢池强, 胡宇翔 等. 可重构技术与未来网络体系架构[J]. 电信科学, 2013,29(8):16-23. LAN J L , XING C Q , HU Y X , et al. Reconfiguration technology and future network architecture[J]. Telecommunications Science, 2013,29(8):16-23.
|
[3] |
兰巨龙, 程东年, 胡宇翔 . 可重构信息通信基础网络体系研究[J]. 通信学报, 2014,35(1):128-139. LAN J L , CHENG D N , HU Y X . Research on reconfigurable information communication basal network architecture[J]. Journal on Communications, 2014,35(1):128-139.
|
[4] |
齐宁, 汪斌强, 郭佳 . 逻辑承载网构建方法的研究[J]. 计算机学报, 2010,33(9):1533-1540. QI N , WANG B Q , GUO J . Research on construction methods of logical carrying network[J]. Chinese Journal of Computers, 2010,33(9):1533-1540.
|
[5] |
王志明 等. 可重构服务承载网容错构建算法研究[J]. 电子与信息学报, 2012,34(2):54-56. WANG Z M , et al. Research on reconfigurable service carrying network resilient construction algorithms[J]. Journal of Electronics & In-formation Technology, 2012,34(2):54-56.
|
[6] |
林闯, 汪洋, 李泉林 . 网络安全的随机模型方法与评价技术[J]. 计算机学报, 2005,28(12):1944-1956. LIN C , WANG Y , LIN Q L . Stochastic modeling and evaluation for network security[J]. Chinese Journal of Computers, 2005,28(12):1944-1956.
|
[7] |
NICOL D M , SANDERS W H , TRIVEDI K S . Model-based evaluation: From dependability to security[J]. IEEE Transactions on Dependability and Security, 2004,1(1):48-65.
|
[6] |
原菊梅 . 复杂系统可靠性 Petri 网建模及智能分析方法[M]. 北京: 国防工业出版社, 2011. YUAN J M . Reliability Petri Net Modeling of Complex Systems and Intelligent Analysis[M]. Beijing: Defense Industry Press, 2011.
|
[9] |
王健, 王慧强, 赵国生 . 信息系统可生存性定量评估的指标体系[J]. 计算机工程, 2009,35(3):54-56. WANG J , WANG H Q , ZHAO G S . Index system of quantitative evaluation for information systems survivability[J]. Computer Engineering, 2009,35(3):54-56.
|
[10] |
陈秀真, 郑庆华 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006,17(4):885-897. CHEN X Z , ZHENG Q H , et al. Quantitative hierarchical threat evaluation model for network security[J]. Jorunal of Software, 2006,17(4):885-897.
|
[11] |
姜伟, 方滨兴 等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,32(4):817-827. JIANG W , FANG B X , et al. Evaluating network security and optimal active defense based on attack2defense game model[J]. Chinese Journal of Computers, 2009,32(4):817-827.
|
[12] |
MCDERMOTT J . Attack-potential-based survivability modeling for high-consequence systems[A]. Proceedings of the 3rd IEEE Interna-tional Workshop on Information Assurance(IWIA'05)[C]. Callege Park, Maryland, USA, 2005.119-130.
|
[13] |
冯萍慧, 连一峰 . 基于可靠性理论的分布式系统脆弱性模型[J]. 软件学报, 2006,17(7):1633-1640. FENG P H , LIAN Y F . A vulnerability model of distributed systems based on reliability theory[J]. Journal of Software, 2006,17(7):1633-1640.
|
[14] |
GOSEVA. P K , WANG F , WANG R . Characterizing intrusion tolerant systems using a state transition model[A]. Proceedings of DARPA DISCEX II Conference[C]. 2001.211-221.
|