[1] 张红旗,王鲁.信息安全技术.北京: 高等教育出版社,2008.ZHANG Hong-qi,WANG Lu.Information Security Technology [M].Beijing: Higher Education Press,2008.(in Chinese) [2] Shannon C E.A mathematical theory of communication [J].Bell System Technical Journal,1948,26(3): 379-423,623-656. [3] 傅祖芸.信息论—基础理论与应用[M].北京: 电子工业出版社,2007. [4] 丁晓青,吴佑寿.模式识别统一熵理论[J].电子学报,1993,21(8): 1-8.DING Xiao-qing,WU You-shou.Unify entropy theory for pattern recognition [J].Acta Electronica Sinica,1993,21(8): 1-8.(in Chinese) [5] 扬明.决策表中基于条件信息熵的近似约简[J].电子学报,2007,35(11): 2156-2160.YANG Ming.Approximate reduction based on conditional information entropy in decision table [J].Acta Electronica Sinica,2007,35(11): 2156-2160.(in Chinese) [6] Morio J,et a1.A characterization of Shannon entropy and Bhattacharyya measure of contrast in polarimetric and interferometric SAR image [J].Proceedings of the IEEE,2009,97(6): 1097- 1108. [7] 付钰,吴晓平,叶清等.基于模糊集与熵权理论的信息系统安全风险评估研究[J].电子学报,2010,38(7): 1489-1494.FU Yu,WU Xiao-ping ,YE Qing et al.An Approach for information systems security risk assessment on fuzzy set and entropy-weigh[J].Acta Electronica Sinica,2010,38(7): 1489-1494.(in Chinese) [8] 赵冬梅,马建峰,王跃生.信息系统的模糊风险评估模型[J].通信学报,2007,28(4): 51-56.ZHAO Dong-mei,MA Jian-feng,WANG Yue-sheng.Model of fuzzy risk assessment of the information system [J].Journal on Communication,2007,28(4): 51-56.(in Chinese) [9] 张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法[J].通信学报,2004,25(11): l58-165.ZHANG Yi-rong,XIAN Ming,WANG Guo-yu.A quantitative evaluation technique of attack effect of computer network based on network entropy [J].Journal on Communications,2004,25(11): 158-l65.(in Chinese) [10] 王栋,潘少明,吴吉春 等.确定风险分析先验概率分布的最大熵方法[J].应用基础与工程科学学报,2006,14(Sup): 318-325.WANG Dong,PAN Shao-ming,et a1.Deriving the prior probability distribution of risk analysis with the use of the principle of maximum entropy [J].Journal of Basic Science and Engineering,2006,14(Sup): 318-325.(in Chinese) [11] 胡 俊,沈昌祥,张 兴.一种BLP模型的量化分析方法[J].小型微型计算机系统,2009,30(8): 1605-1610.HU Jun,SHEN Chang-xiang,ZHANG Xing.Quantitative analysis method to BLP model [J].Journal of Chinese Computer Systems,2009,30(8): 1605-1610.(in Chinese) [12] D Denning.A lattice model of secure information flow [J].Communications of the ACM,l976,l9(5): 236-243. |