http://www.doc88.com/p-0824775188202.html
以企业入侵检测日志分析为场景漫谈大数据安全
http://sec.chinabyte.com/458/13420958.shtml
攻击建模过程
http://www.51cto.com/art/200712/63063.htm
http://www-01.ibm.com/support/knowledgecenter/SSQP76_8.7.1/com.ibm.odm.itoa.develop/topics/odm_itoa_develop.html