7L M Adleman. An abstract theory of computer viruses[ J] .Lecture Notes in Computer Science, 1990,403:109- 115.
8F Cohen,Computer viruses:Theory and experiments[J]. Computers and Security, 1987,6(1) : 22 - 35.
9M Christodorescu, S Jha. Static Analysis of Executables to Detect Malicious Pattems[ A ]. Proceedings of the 12th USENIX Security Symposium[ C]. Washington DC, August 2003. 169 - 186.
10J Bergeron,M Debbabi, J Desharnais,M Erhioui, Y Lavoie,N Tawbi. Static detection of malicious code in executable programs[ A]. In: 1st Symposium on Requirements Engineering for Information Security[ C]. Indianapolis, 2001.525 - 530.
5EVANS S, HEINBUCH D, WALLNER J, et al. Risk-based systems security engineering stopping attacks with intention[J]. IEEE Security & Privacy, 2004, 2 (6) : 59-62.
6EDGE K S, DALTON G C, RAINES R A, et al. Using attack and protection trees to analyze threats and defenses to homeland Security[A]. MILCOM, IEEE[C]. Los Alamitos, 2006.1-7.
7HELMER G, WONG J, SLAGELL M, et al. A software fault tree approach to requirements analysis of an intrusion detection system[A]. Symposium on Requirements Engineering for Information Security[C] Indianapolis, USA, 2001.
8SCHNEIER B. Attack trees: modeling security threats[J]. Dr. Dobb's Journal of Software Tools, 1999,24(12): 21-29.
9SEYIT A C, BULENT Y. Modeling and detection of complex attacks[A]. 3th International Conference on Security and Privacy in Communication Networks[C]. Nice, France, 2007. 234-243.
10EVANS S, WALLER J. Risk-based security engineering through the eyes of the adversary[A]. Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop[C]. New York, 2005. 158-165.