Visintine V. An introduction to information risk assessment. SANS Institute Journal, 2003, 8(5): 101-118.
[2]
Chu C K, Chu M. An integrated framework for the assessment of network operations, reliability, and security[J]. Bell Labs Technical Journal, 2004, 8(4): 133-152.
[3]
王晓箴, 卢志刚, 刘宝旭. 结合OCTAVE和灰色系统的信息安全风险评估方法[J]. 北京邮电大学学报, 2009, 32(5): 128-131. Wang Xiaozhen, Lu Zhigang, Liu Baoxu. Algorithm of information security risk evaluation based on OCTAVE and grey system [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(5): 128-131.
[4]
韦勇, 连一峰. 基于日志审计与性能修正算法的网络安全态势评估模型. 计算机学报, 2009, 32(4): 763-772. Wei Yong, Lian Yifeng. A network security situational awareness model based on log audit and performance correction[J]. Chinese Journal of Computer, 2009, 32(4): 763-772.
[5]
Li Tao. An immunity based network security risk estimation[J]. Science in China Ser F Information Sciences, 2005, 48(5): 557-578.
[6]
彭凌西, 陈月峰. 基于危险理论的网络风险模型[J]. 电子科技大学学报, 2007, 36(6): 1198-1201. Peng Lingxi, Chen Yuefeng. Danger theory based network risk evaluation model. Journal of University of Electronic Science and Technology of China, 2007, 36(6): 1198-1201.
[7]
Glickman M, Balthrop J, Forrest S. A machine learning evaluation of an artificial immune system[J]. Evolut Comput, 2008, 13(2): 179-212.
[8]
Matzinger P. Danger model: a renewed sense of self[J]. Science, 2004, 296(5566): 301-305.
[9]
Zhou Ji, Dasgupta D. Revisiting negative selection algorithm[J]. Evolutionary Computation Journal, 2007, 15(2): 123-139.
[10]
Dasgupta D. Advances in artificial immune system[J]. IEEE Comp Intel Mag, 2008, 11(4): 4-9.
[11]
Kim J, Bentley P. Immune memory and gene library evolution in dynamical clone selection algorithm[J]. Journal of Genetic Programming and Evolvable Machines, 2008, 5(4): 361-391.
[12]
Li Tao. Dynamic detection for computer virus based on immune system [J]. Science in China Series F: Information Sciences, 2008, 51(10): 1475-1486.