6Yau S,Zhang X.Computer Network Intrusion Detection As-sessment and Prevention Based on Security Dependency Rela-tion[C]∥Proc of the23rd Annual International Computer Software&Applications Conference,2009:86-91.
7Biswas G,Debelak A,Kawamura K.Applications of Qualita-tive Modeling to Knowledge-Based Risk Assessment Studies[C]∥Proc of the2nd International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems,2008:92-101.
8Strutt J,Patrick,Custance N.A Risk Assessment Method-ology for Security Advisors[C]∥Proc of the29th IEEE An-nual International Carnahan Conference on Security Tech-nology,2009:225-229.
9Bruce L.Managed Vulnerability Assessment(MVA)-Improve Security by Understanding Your Own Vulnerabilities[J].Network Security,2010,3(4):8-9.