Sheyner O, Haines J, Jha S. Automated generation and analysis of attack graphs//S&P '02. USA: IEEE Computer Society, 2002: 273-284.
[2]
Ou Xinming, Boyer W F, McQueen M A. A scalable approach to attack graph generation//CCS '06. Alexandria: ACM Press, 2006: 336-345.
[3]
Avizienis A, Laprie J, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(1): 11-33.
[4]
Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-650.
[5]
Pamula J, Ammann P. A weakest-adversary security metric for network configuration security analysis//QoP '06. Alexandria: ACM Press, 2006: 31-38.
[6]
Vardi Y, Zhang Cunhui. Measures of network vulnerability[J]. IEEE Signal Processing Letters, 2007, 14(5): 313-316.
[7]
山秀明, 王磊, 任勇, 等. 互联网复杂性研究进展[J]. 北京邮电大学学报, 2006, 29(1): 1-8. Shan Xiuming, Wang Lei, Ren Yong, et al. A survey on the Internet complexity. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1): 1-8.
[8]
MITRE. Common vulnerabilities and exposures(CVE). .