共 4 条
[2]
Information systems security: Scope, state-of-the-art, and evaluation of techniques[J] . G. Pernul.International Journal of Information Management . 1995 (3)
[3]
Security Evaluation Criteria .2 Strous L. Computer&Security . 1994
[4]
A quantitative model of the security intrusion process based on attacker behavior .2 E. Jonsson and T. Olovsson. . 1997