1Peltier T R.Information Security Risk Analysis[M].CRC Press LLC,2001.
2Mercuri R T.Analyzing Security Costs[J].Communications of the ACM,2003,46(6):15-18.
3Ritchey R O,Berry B,Noel S.Representing TCP/ IP Connectivity for Topological Analysis of Network Security[A].Proceedings of the 18th Annual Computer Security Applications Conference[C],California,2002:25-31.
4Anderson R H,Feldman P M,Gerwehr S,et al.Securing the U.S.Defense Information Infrastructure:A Proposed Approach[A].RAND Document MR-993-OSD/NSA/DARPA[C],1999.
5Coello C A C.An Updated Survey of GA-based Multi-objective Optimization Techniques [J].ACM Computing Surveys,2002,32(2):109-143.