| [1]杜亚男. 基于攻击图的产品信息安全风险评价方法研究[D]. 北京: 北京邮电大学, 2020[2]Homer J, Ou X, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks[EBOL]. 20030602 [20100321]. https:www.researchgate.netpublication228564095_A_sound_and_practical_approach_to_quantifying_security_risk_in_enterprise_networks[3]Peng X, Li J H, Ou X, et al. Using bayesian networks for cyber security analysis[C] Proc of 2010 IEEEIFIP Int Conf on Dependable Systems and Networks. New York: IEEE, 2010[4]Frigault M, Wang L, Singhal A, et al. Measuring network security using dynamic bayesian network[C] Proc of the 4th ACM Workshop on Quality of Protection. New York: ACM, 2008[5]Cheng P, Wang L, Jajodia S, et al. Aggregating CVSS base scores for semanticsrich network security metrics[C] Proc of the 31st IEEE Symp on Reliable Distributed Systems. New York: IEEE, 2012[6]张玺, 黄曙光, 夏阳, 等. 一种基于攻击图的漏洞风险评估方法[J]. 计算机应用研究, 2010, 27(1): 278280[7]Wang H, Chen Z, Zhao J, et al. A vulnerability assessment method in industrial Internet of things based on attack graph and maximum flow[J]. IEEE Access, 2018, 6(2): 8599 8609[8]韦早裕, 吴鸣旦, 马楠, 等. 基于博弈模型的物联网系统漏洞风险评估[J]. 信息安全研究, 2018, 4(10): 914921[9]陈宁. 网络安全评估方法研究[J]. 固原师专学报, 2005, 26(3): 3438, 49[10]汪楚娇, 林果园. 网络安全风险的模糊层次综合评估模型[J]. 武汉大学学报(理学版), 2006, 40(5): 622626 |