1. Research on Aggregation Technology for Information Security Knowledge Based on Security Ontology[J];zhong;Netinfo Security,2017
2. IEIChang—ha. Survey of Attack Graph Technique [J];chen;Computer Science,2011
3. Attack Graph Generation Method Integrating Social Network Threats[J];yang;Computer Engineering,2021
4. Network intrusion intention analysis model based on Bayesian attack graph[J];luo;Journal on Communications,2020
5. Quantitative assessment of social engineering threat in social network;zhang;Journal of Zhejiang University (Engineering Science),2019