Engebretson P. The basics of hacking and penetration testing: ethical hacking and penetration testing made easy[M]. Waltham, Massachusetts: Syngress, 2011:1-10.
[2]
叶云,徐锡山,齐治昌,等.大规模网络中攻击图自动构建算法研究[J].计算机研究与发展,2013,10:2133-2139. Ye Yun, Xu Xishan, Qi Zhichang, et al. Attack graph generation algorithm for large-scale network system[J]. Journal of Computer Research and Development, 2013,10:2033-2139. (in Chinese)
[3]
罗森林,张蕾,郭亮,等.一种高效的攻击树串行建模方法[J].北京理工大学学报,2013(5):500-504. Luo Senlin, Zhang Lei, Guo Liang, et al. An original effective method for modeling the attack tree[J]. Transactions of Beijing Institute of Technology, 2013(5):500-504. (in Chinese)
[4]
Xu Dianxiang, Tu Manghui, Sanford M, et al. Automated security test generation with formal threat models[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(4):526-540.
[5]
王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010(9):1748-1762. Wang Yuanzhuo, Lin Chuang, Cheng Xueqi, et al. Analysis for network attack-defense based on stochastic game model[J]. Chinese Journal of Computers, 2010(9):1748-1762. (in Chinese)