5Zhaoyang Qu, Jia Yan. The Design of the Network Security Model of Active Defense [C]. Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference, 2008, 1-4. 被引量:1
6Hassan, A.A., Bahgat, W.M.. A framework for translating a high level security policy into low level security mechanisms[C]. Computer Systems and Applications, 2009, AICCSA 2009. IEEE/ACS International Conference. 2009. 504-511. 被引量:1
7Apostal, D., Foote-Lennox, T., Markham, T., Down, A., Lu, R., O'Brien, D.. Checkmate network security modeling [C]. DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings, 2001, 214 - 226 vo1.1. 被引量:1
10Endsley M 1K. Design and Evalnation for Situation Awareness Enhancement[C]//Proceedings of the 32nd Annual Meeting on Human Factors Society. Santa Monica, CA: Human Factors Society, 1988: 97- 101. 被引量:1