共 14 条
- [1] PHILLIPS C, SWILER L P., A Graph-based Network-vulnerability Analysis System, Proceedings of the New Security Paradigms Workshop, pp. 71-79, (1998)
- [2] YANG Yingjie, LENG Qiang, CHANG Dexian, Et al., Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph, Journal of Electronics & Information Technology, 41, 8, pp. 1838-1846, (2019)
- [3] pp. 153-160, (2007)
- [4] ZHANG Shuqin, LI Kaijiang, ZHANG Lu, Et al., Research on Attack Graph Generation Based on Q-learning Mechanism, Electronic Science and Technology, 31, 10, pp. 6-10, (2018)
- [5] YE Ziwei, GUO Yuanbo, WANG Chendong, Et al., Survey on Application of Attack Graph Technology, Journal on Communications, 38, 11, pp. 121-132, (2017)
- [6] SUN Yipin, ZHONG Qiuxi, SU Jinshu, Research on Intention Recognition Based on HMM, Computer Engineering & Science, 29, 8, pp. 19-22, (2007)
- [7] LI Qingpeng, WANG Buhong, WANG Xiaodong, Et al., Approach on Network Security Enhancement Strategies Based on Optimal Attack Path, Computer Science, 40, 4, pp. 152-154, (2013)
- [8] DEWRI R, RAY I, POOLSAPPASIT N, Et al., Optimal Security Hardening on Attack Tree Models of Networks:a Costbenefit Analysis[J], International Journal of Information Security, 11, 3, pp. 167-188, (2012)
- [9] WANG Hui, RU Xinxin, DAI Tianwang, Et al., Attack Profit Path Prediction Algorithm Based on NAPG Model, Journal of Jilin University(Science Edition), 57, 5, pp. 1169-1178, (2019)
- [10] WANG Hui, LOU Yalong, DAI Tianwang, Et al., Vulnerability Evaluation Algorithm Based on BNAG Model, Computer Engineering, 45, 9, pp. 128-135, (2019)