2Lowe G Roscoe B.Using CSP to Detect ErrorS in the TMN Protocol IEEE Transactions on Software Engineering,1997,23(10):659—669.
3Thorhuus R Software Fault Injection Testing Mater Thesis ELE/ESK/2000—2 Ericsson Telecom.Stockholm.Sweden,2000—02.
4Howard J D.An Analysis of Security Incident on the Internet[Ph D dissertationl.Carnegie Mellon University.West Lafayette,USA,1997.
5Horton J D,Harland R,Ashby E,et a1.The Cascade Vulnerability Problem.In:Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy,1993:110—116.
6Cooper G Computational Complexity of Probabilistic In—ference Using Bayesian Belief Networks(Research Note)[J].Artificial Intelligence,1990,42(2/3):393—405.