[1] |
宋超臣, 王希忠, 黄俊强 , 等. Web渗透测试流程研究[J]. 电子设计工程, 2014,22(17):162-167.
|
|
Song Chaochen, Wang Xizhong, Huang Junqiang , et al. Research on Web penetration testin process[J]. Electronic Design Engineering, 2014,22(7):162-167.
|
[2] |
王丽燕, 崔占中, 陈伟华 , 等. 电动汽车充电桩自动化渗透测试系统的研究和设计[J]. 中国电力, 2019,52(1):57-62.
|
|
Wang Liyan, Cui Zhanzhong, Chen Weihua , et al. Research and design of automatic penetration testing system for electric vehicle charging piles[J]. Electric Power, 2019,52(1):57-62.
|
[3] |
徐丙凤, 何高峰 . 基于攻击图的信息物理融合系统渗透测试方法[J]. 计算机科学, 2018,45(11):150-155.
|
|
Xu Bingfeng, He Gaofeng . Penetration testing method of information physics fusion system based on attack graph[J]. Computer Science, 2018,45(11):150-155.
|
[4] |
王世轶, 吴江, 张辉 . 渗透测试在网络安全等级保护测评中的应用[J]. 计算机应用与软件, 2018,35(11):196-199.
|
|
Wang Shiyi, Wu Jiang, Zhang Hui . The application of penetration test in the evaluation of network security classified protection[J]. Computer Applications and Software, 2018,35(11):196-199.
|
[5] |
王胜 . 基于攻击图的渗透测试系统设计与实现[D]. 重庆:重庆大学, 2012.
|
|
Wang Sheng . Design and implementation of penetration testing system based on attack graph[D]. Chongqing:Chongqing University, 2012.
|
[6] |
胡欣, 孙永林, 王勇军 . 一种基于网络安全梯度的攻击图生成并行化方法[J]. 计算机应用与软件, 2011,28(11):25-29.
|
|
Hu Xin, Sun Yonglin, Wang Yongjun . A network security grade based attack graph generation parallel approach[J] Computer Applications and Software, 2011,28(11):25-29.
|
[7] |
刘威歆, 郑康锋, 胡影 , 等. 一种基于目标攻击图的态势威胁评估方法[J]. 北京邮电大学学报, 2015(1):82-86.
|
|
Liu Weixin, Zheng Kangfeng, Hu Ying , et al. Approach of goal-oriented attack graph-based threat evaluation for network security[J]. Journal of Beijing University of Posts and Telecommunications, 2015(1):82-86.
|
[8] |
叶子维, 郭渊博, 王宸东 , 等. 攻击图技术应用研究综述[J]. 通信学报, 2017(11):125-136.
|
|
Ye Ziwei, Guo Yuanbo, Wang Chendong , et al. Survey on application of attack graph technology[J]. Journal on Communications, 2017(11):125-136.
|
[9] |
高妮, 高岭, 贺毅岳 , 等. 基于贝叶斯攻击图的动态安全风险评估模型[J]. 四川大学学报:工程科学版, 2016,48(1):111-118.
|
|
Gao Ni, Gao Ling, He Yiyue , et al. Dynamic security risk assessment model based on bayesian attack graph[J]. Jounal of Sichuan University:Engineering Science Edition, 2016,48(1):111-118.
|
[10] |
栾俊超 . 面向渗透测试的漏洞检测与攻击方法[D]. 南京:南京航空航天大学, 2017.
|
|
Luan Junchao . Vulnerability detection and attack method for penetration testing[D]. Nanjing:Nanjing University of Aeronautics and Astronautics, 2017.
|
[11] |
原锦明 . 面向工控网络安全和漏洞分析的攻击图生成研究[J]. 现代电子技术, 2016,39(11):103-107.
|
|
Yuan Jinming . Research on attack graph generation for industrial control network security and vulnerability analysis[J]. Modern Electronics Technique, 2016,39(11):103-107.
|
[12] |
李浩杰, 裘国永 . 基于自动化渗透测试的分析[J]. 电子设计工程, 2015,23(22):25-28.
|
|
Li Haojie, Qiu Guoyong . Analysis based on automated penetaration testing[J]. Electronic Design Engineering, 2015,23(22):25-28.
|
[13] |
顾明昌, 王丹, 赵文兵 , 等. 一种基于攻击向量自动生成的XSS漏洞渗透测试方法[J]. 软件导刊, 2016,15(7):173-177.
|
|
Gu Mingchang, Wang Dan, Zhao Wenbing , et al. A vulnerability penetration test method for XSS based on automatic generation of attack vectors[J]. Software Guide, 2016,15(7):173-177.
|
[14] |
康乾 . 基于攻击图的多源安全事件关联分析研究[D]. 杭州:杭州师范大学, 2016.
|
|
Kang Qian . Multi-source security incident correlation analysis based on attack graph[D]. Hangzhou:Hangzhou Normal University, 2016.
|
[15] |
胡浩, 叶润国, 张红旗 , 等. 基于攻击预测的网络安全态势量化方法[J]. 通信学报, 2017,38(10):122-134.
|
|
Hu Hao, Ye Runguo, Zhang Hongqi , et al. Quantitative method for network securitysituation based on attack prediction[J]. Journal on Communications, 2017,38(10):122-134.
|
[16] |
刘文彦, 霍树民, 仝青 , 等. 网络安全评估与分析模型研究[J]. 网络与信息安全学报, 2018,4(4):1-11.
|
|
Liu Wenyan, Huo Shumin, Tong Qing , et al. Research on models of network security evaluation and analysis[J]. Chinese Journal of Network and Information Security, 2018,4(4):1-11.
|