1. Clark K, Tyree S, Dawkins J, et al. Qualitative and quantitative analytical techniques for network security assessment[C]//Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. IEEE, 2004: 321–328.
2. Network security assessment using a semantic reasoning and graph based approach[J];Wu S;Computers & Electrical Engineering,2017
3. Ghosh N, Ghosh S K. An approach for security assessment of network configurations using attack graph[C]//2009 First International Conference on Networks & Communications. IEEE, 2009: 283–288.
4. A framework for sign gesture recognition using improved genetic algorithm and adaptive filter[J];Kaluri R;Cogent Engineering,2016
5. Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds[J];Gonzales D;IEEE Transactions on Cloud Computing,2015