Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior[J]. IEEE Transactions on Software Engineering, 1997, 23(4): 1-11.
[2]
郭世泽, 牛冠杰, 郑康锋. 入侵容忍系统模型构建及量化分析[J]. 北京邮电大学学报,2007, 30(1): 36-39. Guo Shize, Niu Guanjie, Zheng Kangfeng, An intrusion tolerance model and quantizing analysis[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 36-39.
[3]
Wang Feiyi, Gong Fengmin, Sargor C, et al. SITAR: a scalable intrusion-tolerant architecture for distributed services//Proceedings of 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop. New York: IEEE Press, 2001:1-8.
[4]
Madan B B, Popstojanova K, Vaidyanathan K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant system. 2004. http://www.ee.duke.edu/~kst/security/Madan.pdf.