4VARDI Y, ZHANG Cunhui. Measures of network vulnerability[ J ]. IEEE Signal Processing Letters, 2007, 14 ( 5 ) : 313-316.
5ZHANG Lufeng,TANG Hong, CUI Yiming, et al. Network security evaluation through attack graph generation[J].World Academy of Science, Engineering and Technology, 2009, 54:412-415.
7MELL P. The common vulnerability scoring system (CVSS) and its applicability to federal agency systems [R]. NIST Interagency Report 7435, 2007.
8Frigault M, Wang L Y, Singhal A, et al. Measuring network security using dynamic Bayesian network[ C] ffConference on Computer and Communications Security Proceedings of the 4th ACM Workshop on Quality of Protection. New York, USA :ACM, 2008:23-30.
9Sawilla R, Ou X M. Googling attack graphs[ RI. Defence R & D,Canada,Ottawa, Tech. Rep: TM 2007-205, 2007.
10FIRST. A complete guide to the common vulnerability scoring system version 2.0[ DB/OL]. [2011-02-01 ]. http: //www. first, org/cvss/ cvss-guide, html.
2LIU R,YAN D,Lin F,et al.Optimization of Hierarchical Vulnerability Assessment Method[C]//IEEE Proceedings of IC-BNMT,Beijing:Broadband Network&Multimedia Technology.2009:458-462.
3YE J,ZHANG K.Vulnerability Threat Assessment Based on AHP And Fuzzy Comprehensive Evaluation[C]//IEEE Seventh International Symposium on Computational Intalligence and Design Computer Society,Hangzhou:Computational Intelligence and Design.2014:513-516.DOI:10.1109/ISCID.2014.231.