4D'Ambrosio B, Takikawa M, Upper D, et al. Security situation assessment and response evaluation[C] // Proceedings of DARPA Information Survivability Conf & Exposition Ⅱ. Anaheim, USA: IEEE, 2001.387 - 394.
5Hariri S, Qu G Z, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks [J]. IEEE Security & Privacy, 2003,1(5) :49 - 54.
6Ortalo R, Deswarte Y. Information systems security: Specification and quantitative evaluation, 20072 [R]. Toulouse, France: LAAS-CNRS & INRIA, 1997.
7Ortalo R, Deswarte Y, Kaaniche M, Experimenting with quantitative evaluation tools for monitoring operational seeurity[J]. IEEE Transaetions on Software Engineering, 1999,25(5) :633 - 650.
8Sheyner O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs[C]// Proceedings of the 2002 IEEE Symposium on Security and Privacy. Oakland, CA : [s. n. ], 2002 : 273 - 284.
9Sheyner O. Scenario graphs and attack graphs [D]. Pittsburgh, USA: School of Computer Science, Carnegie Mellon University, 2004.