4[4]Moore Andrew, Ellison Robert, Linger Richard. Attack Modeling for Informational Security and Survivability[DB/OL]. CMU/SEI -2001-TN-001. http://www. cert.org/archive/pdf/01tn001.pdf, 2001-03.
5[5]Schneier B. Attack Trees[J]. Dr. Dobb's Journal of Software Tools 24, 1999,(12):21-29.
6[6]Moberg Fredrick. Security of an Information System using an attack tree methodology[DB/OL]. http://www. ce.chalmers.se/staff /jonsson/fredrik.moberg-thesis.pdf, 2000-11-16
7[7]Steffan Jan, Schumacher Markus. Collaborative Attack Modeling[Z]. ACM 1-58113-445-02/02/03, 2 February 2002.
8[8]Schudel Gregg, Wood Bradley. Modeling Behavior of the Cyber Terrorist[A] (submitted to) 2000 National Information Systems Security Conference, Baltimore MD, October 2000.
9RFC 2753, A Framework for Policy - based Admission Control[S].2000.
10RFC 2748 ,.The COPS (Common Open Policy Service) Protocol[S].2000.