This work is licensed under the Creative Commons Attribution 4.0 International License.
Yuan, H. (2020). Research and discussion on the network security level protection 2.0 system. Information & Computer (Theoretical Edition), 32(01), 223-224.Search in Google Scholar
Wang, C. X., Jiang, L. W., Li, J. H., Guo, X. Y., Wang, W. H., & Xia, Y. Y. (2024). Design and implementation of an assessment management system based on network security level protection 2.0. Science & Technology Innovation and Application, 14(06), 28-33+37.Search in Google Scholar
Wu, Y., Deng, K. F., & Liu, B. (2018). A brief analysis of the impact of the “Cybersecurity Law” on network management. Jiangxi Communications Technology, (02), 43-45.Search in Google Scholar
Yin, Y. R., & Tang, L. (2021). “Level Protection 2.0” important information system security level protection and rectification. Information Recording Materials, 22(02), 174-175.Search in Google Scholar
Wang, G. L. (2022). On the evolution and main changes of network security level protection. Digital Communication World, (02), 91-93.Search in Google Scholar
GB/T 28448-2019. (2019). Information security technology—Assessment requirements for network security level protection [Standard].Search in Google Scholar
GB/T 22240-2020. (2020). Information security technology—Guidelines for network security level protection grading [Standard].Search in Google Scholar
Fu, C. L., Zhang, H., Li, F. L., et al. (2024). A threat model-based framework and tool for generating security test cases. Journal of Software, 1-31. https://doi.org/10.13328/j.cnki.jos.006973.Search in Google Scholar
Budde, C. E., Kolb, C., & Stoelinga, M. (2021). Attack trees vs. fault trees: Two sides of the same coin from different currencies. In Proc. of the 18th Int’l Conf. on Quantitative Evaluation of Systems (pp. 457-467). Paris: Springer. https://doi.org/10.1007/978-3-030-85172-9_24.Search in Google Scholar
Shostack, A. (2014). Threat modeling: Designing for security. John Wiley & Sons.Search in Google Scholar
Howard, M., & Lipner, S. (2008). The security development lifecycle. (Z. X. Li, Trans.). Beijing: Publishing House of Electronics Industry.Search in Google Scholar
Wüchner, T., Ochoa, M., & Pretschner, A. (2014). Malware detection with quantitative data flow graphs. In Proc. of the 9th ACM Symposium on Information, Computer and Communications Security (pp. 271-282). New York: ACM Press.Search in Google Scholar