共 28 条
- [1] Alhazmi O.H., Malaiya Y.K., Ray I., Security vulnerabilities in software systems: A quantitative perspective [G], pp. 281-294, (2005)
- [2] Alhazmi O.H., Malaiya Y.K., Ray I., Measuring, analyzing and predicting security vulnerabilities in software systems, Computers & Security, 26, 3, pp. 219-228, (2007)
- [3] Kim J., Malaiya Y.K., Ray I., Vulnerability discovery in multi-version software systems, pp. 141-148, (2007)
- [4] Chen K., Feng D., Su P., Et al., Multi-cycle vulnerability discovery model for prediction, Journal of Software, 21, 9, pp. 2367-2375, (2010)
- [5] Fava D.S., Byers S.R., Yang S.J., Projecting cyberattacks through variable-length Markov models, 3, 3, pp. 359-369, (2008)
- [6] Holsopple J., Yang S.J., Sudit M., TANDI: Threat assessment for networked data and information, SPIE 6242: Proc of Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2006, pp. 1-11, (2006)
- [7] Mathew S., Shah C., Upadhyaya S., An alert fusion framework for situation awareness of coordinated multistage attacks, pp. 95-104, (2005)
- [8] Yang S.J., Byers S., Holscopple J., Et al., Intrusion activity projection for cyber situational awareness, pp. 167-172, (2008)
- [9] Holsopple J., Yang S.J., FuSIA: Future situation and impact awareness, pp. 1-8, (2008)
- [10] Wei Y., Lian Y., A network security situational awareness model based on log audit and performance correction, Chinese Journal of Computer, 32, 4, pp. 763-772, (2009)