4GONZALEZ J J, MOORE A P. System dynamics modeling for information security [EB/OL]. [2004-09-10]. http://www.cert.org/ research/sdmis/inside-threat-desc.
5胡征畴.蜜罐技术在入侵检测系统中的应用[D].武汉:武汉理工大学,2007.
6Tenable Network Security. Features [EB/OL]. [2009-02-03]. http ://www.nessus.org/nessus/features/.
7Global Payments cops to 1.5 million total on credit card breach [EB/OL]. http://www.infosecurity-magazine.comlview/24914/ globalpayments-cops-to-15-million-total-on-credit-card-breachl ,2012.
8Atwal, Maya, Edwin Bacon. The youth movement Nashi , contentious politics, civil society, and party politics [J]. East European Politics ,2012 ,28(3) :256-266.
9Goel, Sanjay. Cyberwarfare , connecting the dots in cyber intelligence[J]. Communications of the ACM,2011 ,54(8) : 132-140.
10Interpretation of " 12th Five-Year" development plan for the information security industry[EB/OL]. http://www.cena.com.cn/a/2012-03-05/133091744165518. shtml,2012.