1. Pan, L., Li, T.Y.: Dynamic information security evaluation model in mobile Ad Hoc network. J. Comput. Appl. 35(12), 3419–3423 (2015)
2. Chen, Y.Q., Wu, X.P., Fu, Y., et al.: Network security evaluation based on stochastic game and network entropy. J. Beijing Univ. Posts Telecommun. 37(s1), 92–96 (2014)
3. Dong, J.Q.: The power struggles of cyber space and information security management in South Korea and its inspirations to China’s information governance. Inf. Sci. 4, 153–157 (2016)
4. Navare, J., Gemikonakli, O.: Governance and risk management of network and information security: the role of public private partnerships in managing the existing and emerging risks. Commun. Comput. Inf. Sci. 92, 170–177 (2010)
5. Cheng, Y.X., Jiang, W., Xue, Z. et al.: Multi-objective network security evaluation based on attack graph model. Journal of Computer Research and Development (s2), 23–31 (2012)