2Helmer G, Wong J, Slagell M, et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[A].In Symposium on Requirements Engineering for Information Security[C]. Indianapolis, USA, 2001.
4Tidwell T Larson R Fitch K Hale J. Modeling Internet Attacks[M]. ISBN 0-7803-9814-9. June 2001.
5Scambray Joel, McClure Stuart, Kurtz George. Hacking Exposed: Network Security Secrets & Solutions[M] (Second Edition).Berkley: McGraw Hill, 2001.
6Schudel Gregg, Wood Bradley. Modeling Behavior of the Cyber Terrorist[A]. Proceedings of 2000 National Information Systems Security Conference[C]. Baltimore MD, October 2000.
7Moore Andrew, Ellison Robert, Linger Richard. Attack Modeling for Informational Security and Survivability[DB/OL]. CMU/SEI -2001-TN-001. March 2001. http://www. cert.org/archive/pdf/01 tn001.pdf, 2001-03.
8Ahuja, Vijay. Network and Internet Security[Z]. Boston, MA:Academic Press. 1996.
9Sandeep Kumar. Classification and detection of computer intrusions [D/OL]. PurdueUniversity, ftp://coast.cs. purdue.edu/pub/COAST/papers/sandeep-kumar/kumar-intdet-phddiss.ps.Z. WestLafayette, USA, 1995.
10Staniford-Chen S, Tung B, Schnackenberg D. The Common Intrusion Detection Framework (CIDF)[Z]. Information Survivability Workshop, Orlando FL, October 1998.