9Abedin M, Nessa S, AI Shacr E, et al. Vulnerability analysis for evaluating quality of protection of security policies [C]//Proc of the 2nd ACM CCS Workshop on Quality of Protection. New York: ACM, 2006:49-52.
10Ahmed M, Al-Shaer E, Khan L. A novel quantitative approach for measuring network security [C] //Proc of the 27th Conf on Computer Communications. Piscataway, NJ: IEEE, 2008:1957-1965.