3Liu Zhiming, Li Sheng, He Jin, et al. Complex network security analysis based on attack graph model[ C ]///2012 Instrumentation, Measurement, Computer, Communica- tion and Control International Conference. Piscataway. Is. 1. ] : IEEE Press, 2012: 153-186.
4GALA. Managing uncertainty in schema matching with top-k schema mappings [ Jl. Journal on Data Semantics IV, 2006, 4(9) : 90-114.