2Ye N, Hosmcr C, Giordano J, et al. Critical information infrastructure protection through process modeling and model-based information fusion [ J]. Proceedings of the Information Survivability Workshop, 1998.
3Schneier B. Attack trees [J]. Dr. Dobb's Journal of Software Tools, 1999,12(24) : 21 -29.
4Cohen F B. Simulating cyber attacks, defenses, and consequences[J]. Computers and Sevurity,1999,18(6) :479 -518.
5Chi S D, Park J S, Jung K C, et al. Network security modeling and cyber attack simulation methodology[ C ]//Vijay Varadharajan. Australasian Conference on Information Security and Privacy ( ACISP). London : Springer-Verlag ,2001 ,320 - 333.
6Park E K, Yun J B, In H P. Sintulating cyber-intrusion using ordered UML model-based scenarios [ C ]//Lecture Notes in Artificial Intelligence ( Subseries of Lectwe Notes in Computer Science). London: Springer, 2005 , 6d3-651.
7Vigna G, Eckmann S T, Kcmmerer R A. Attack languages[J]. Proceedings of the IEEE Information Survivability Workshop (ISW 2000), 2000,163 - 166.
8Eckmann S T,Vigna G, Kemmerer R. STATL:An attack language for state-based intrusion detection[ J]. Journal of Computer Security, 2002,10:71 - 104.
9Cuppens F, Ortalo R. LAMBDA: A language to model a data- base for detection of attacks[J]. Recent Advances in Intrusion Detection (RAID 2000), 2000, 1907,197-216.
10Ce dric M, Ludovic M. ADele: An attack description language for knowledge-based intrusion detection[ C ]//Proc of the 16th Int'l Conf on Information Security. Dordrecht, Holland :Kluwer, 2001,353 - 368.