2Frigault M, Wang L Y, Singhal A, et al. Measuring network security using dynamic Bayesian network[ C] ffConference on Computer and Communications Security Proceedings of the 4th ACM Workshop on Quality of Protection. New York, USA :ACM, 2008:23-30.
3Sawilla R, Ou X M. Googling attack graphs[ RI. Defence R & D,Canada,Ottawa, Tech. Rep: TM 2007-205, 2007.
4FIRST. A complete guide to the common vulnerability scoring system version 2.0[ DB/OL]. [2011-02-01 ]. http: //www. first, org/cvss/ cvss-guide, html.
5Barthelemy M. Betweenness centrality in large complex networks[ J]. Eurpean Physical Journal B ,2004,38 (2) :163-168.
6Steven N, Sushil J D, Brian 0 B, et al. Efficient minimum-cost network hardening via exploit dependency graphs[ C ]// Proceedings of ACSAC. 2003:86-95.
7National Institute of Standards and Technology. National vulnerability database [ DB/OL ]. [ 2011-03-153. http: // nvd. nist. gov/.