1. Stallings, W., Network security essentials: applications and standards. 2007: Prentice Hall.
2. Feixian, S., W. Jianhong, and D. Zhiyong, Network Security Evaluation Model Based on FCM [J]. Journal of Henan Institute of Engineering (Natural Science Edition), 2009. 2.
3. Zhi-qin, S., et al., Study of campus network security evaluation index system based on extension analytic hierarchy process. Journal of Hefei University of Technology (Natural Science), (2010).
4. Gong, Q. and H. Ding, Threat Evaluation Model for Hierarchical Network Security Based on DS Evidence Theory. Computer Applications and Software, 2008. 11: pp.121-124.
5. Kotenko, I. and M. Stepashkin. Attack graph based evaluation of network security. 2006: Springer.