| [1] |
云计算关键行业应用报告(2017 年)[R]. 北京: 中国信息通信研究院,2017.
|
| [2] |
SHEYNER O, HAINES J, JHA S, et al. Automated Generation and Analysis of Attack Graphs[C]//Proceedings of 2002 IEEE Symposium on Security and Privacy, IEEE, 2002: 273-284.
|
| [3] |
OU XINMING, BOYER W F, MCQUEEN M A. A Scalable Approach to Attack Graph Generation[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, 2006: 336-345.
|
| [4] |
叶子维, 郭渊博, 王宸东, 等. 攻击图技术应用研究综述[J].通信学报, 2017, 38(11): 121-132.
|
| [5] |
MJIHIL O, KIM D S, HAQIQ A. Security assessment framework for multitenant cloud with nested virtualization[J]. Journal of Information Assurance and Security, 2016, 11(2): 283-292.
|
| [6] |
KAYNAR K, SIVRIKAYA F. Distributed attack graph generation[J].IEEE Transactions on Dependable and Secure Computing, 2016,13(5):519-532.
|
| [7] |
MCKEOWN N. Software-defined networking[J]. INFOCOM Keynote Talk, 2009, 17(2): 30-32.
|
| [8] |
NUNES B A A, MENDONCA M, NGUYEN X N, et al. A survey of software-defined networking: past, present, and future of programmable networks[J]. IEEE Communications Surverys and Tutorials, 2014, 16(3):1617-1634.
|
| [9] |
SHARIR M. A strong-connectivity algorithm and its applications in data flow analysis[J]. Computers & Mathematics with Applications, 1981, 7(1): 67-72.
|
| [10] |
GABOW H N. Path-based depth-first search for strong and biconnected components[J]. Information Processing Letters, 2000, 74(3/4): 107-114.
|
| [11] |
TANGE O. GNU parallel-the command-line power tool[J]. USENIX Magazine, 2011, 36(1): 42-47.
|