RAO Anand S.AgentSpeak(L):BDI agents speak out in a logical[DB/OL].[2007-22-20].http:∥www.cs.mu.oz.au/682/agentspeak.pdf.
[2]
TAMBE Milind,JOHNSON W L,JONES Randolph M,et al.Intelligent agents for interactive simulation environments[J].AI Magazine(AIM),1995,16(1):15-39.
[3]
RAY Helayne T,VEMURI Raghunath,KANTUBHUKTA Hariprasad R.Toward an automated attack model for red teams[J].IEEE Security and Privacy,2005,3(4):18-25.
[4]
郭春霞,刘增良,陶源,等.虚拟网络攻防分析模型研究[J].计算机工程与应用,2008,44(25):100-203.GUO Chun-xia,LIU Zeng-liang,TAO Yuan,et al.Virtual internet offensive and defensive analysis model[J].ComputerEngineering and Applications,2008,44(25):100-203.(in Chinese)
[5]
郭春霞,苗青.僵尸网络传播与控制机制研究[J].北京工业大学学报,2008,34(增刊):40-45.GUO Chun-xia,MIAO Qing.Research and progress of zombie network[J].Journal of Beijing University of Technology,2008,34(Supp):40-45.(in Chinese)
[6]
LARS B.Comparative study of quantitative models for hardware[J].Quality and Reliability Engineering International,2007,9(6):501-518.
[7]
TENG X L.Reliability modeling of hardware and software interactions,and its applications[J].IEEE Trans on Rel,2006,55(4):571-577.
[8]
KRAEMER S,CARAYON P,RUTH D,et al.Red team performance for improved computer security[DB/OL].[2009-03-23].http:∥cipi.engr.wisc.edu/system/files/neworleans.pdf.