共 23 条
- [1] Long M., Xia J.B., Zhang Z.Y., Et al., Network security assessment based on node correlated HMM, Journal of Beijing University of Posts and Telecommunications, 33, 6, pp. 121-124, (2010)
- [2] Zhang B.W., Luo Z., Xue Z., Et al., A network risk assessment model based on network global priviliege graph, Journal of Shanghai Jiaotong University, 44, 9, pp. 1197-1200, (2010)
- [3] Stijn V.C., Threat modeling for web application using the STRIDE model, (2004)
- [4] Fu Y., Wu X.P., Ye Q., Approach for information systems security situation evaluation using improved FAHP and Bayesian network, Journal on Communications, 30, 9, pp. 135-140, (2009)
- [5] Nguyen H.V., Choi Y., Proactive detection of DdoS attacks utilizing k-NN classifier in an anti-DDos framework, International Journal of Electrical, 4, 4, pp. 247-252, (2010)
- [6] Xie B.L., Yu S.Z., Application layer real-time proactive defense system based on application layer protocol analysis, Chinese Journal of Computers, 34, 3, pp. 452-463, (2011)
- [7] Li Z.F., Using support vector machines to enhance the performance of Bayesian face recognition, IEEE Transactions on Information Forensics and Security, 2, 2, pp. 174-180, (2007)
- [8] Mcnab C., Network Security Assessment, (2007)
- [9] Zhang Y.Z., Fang B.X., Chi Y., Survey and evaluation on computer vulnerability database, Computer Science, 33, 8, pp. 19-21, (2006)
- [10] Zhou L., Li J.E., Lu T.B., Et al., Research on quantitative assessment model on vulnerability risk for information system, Journal on Communications, 30, 2, pp. 71-76, (2009)