陈光.信息系统信息安全风险管理方法研究[D].长沙:国防科技大学研究生院,2006.Chen Guang.Research on method of information system informarion security risk management[D].Changsha:Graduate School of National University of Defense Technology,2006.
[2]
Ou Xin-ming.A scalable approach to attack graph generation[A].Proceedings of the 13th ACM Conference on Computer and Communications Security[C].Alexandria Virginia,USA:ACM,2006.336-345.
[3]
O Sheyner.Scenarios Graphs and Attack Graphs[D].Pittsburgh,Pennsylvania,USA:Department of Computer Science,Carnegie Mellon University,2004.
[4]
L Swiler,C Philips,D EUis,et al.Computer-attack graph generation tool[A].DARPA Information Survivability Conference and Exposition Proceedings[C].Anaheim,CA,USA:IEEE,2002.307-321.
[5]
Wei Li.An Approach to Graph-Based Modeling of Network Exploitations[D].Mississippi State:Mississippi State University,2005.
R M Jensen,M M Veloso,R E Bryant.Guided symbolic universal planning[A].Proceedings of the 13th International Conference on Automated Planning and Scheduling[C].Trento,Italy:IEEE,2003.123-132.
[8]
毛撼东.基于逻辑渗透图模型的网络安全风险评估方法研究[D].长沙:国防科技大学研究生院,2008.Mao Han-dong.A novel assessment approach based on logical exploitation graph model for network security[D].Changsha:Graduate School of National University of Defense Technology,2008.
[9]
P Ammann,D Wijesek_era,S Kaushik.Scalable,graph-based network vulnerability analysis[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM,2002.217-224.
[10]
Li Wei.An approach to model network exploitations using ex ploitation graph[J].SIMULATION,2006,82(8):523-541.
[11]
Lippmann R,K W Ingols.An Annotated Review of Past Papers on Attack Graphs[R].Project Report IA-1,Lexington,Massachusetts:Lincoln Laboratory of Massachusetts Institute of Technology,201)5.
[12]
宋泾舸,查建中,陆一平.智能规划研究综述——一个面向应用的视角[J].智能系统学报,2007,2(2):18-25.Song Jian-ge,Cha Jian-zhong,Lu Yi-ping.Survey on AI planning research-an application-oriented perspective[J].CAAI Transactiom on Intelligent Systems,2007,2(2):18-25.