共 20 条
[1]
Agrawal R., 2003, P 19 INT C DAT ENG I
[2]
Ammann P., 2002, P 9 ACM C COMPUTER C, P217, DOI DOI 10.1145/586110.586140
[3]
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[4]
JAJODIA S, 2003, MANAGING CYBER THREA
[5]
Ning P., 2002, P 9 ACM C COMP COMM, P245
[6]
NOEL S, 2004, P 20 ANN COMP SEC AP
[7]
Noel S., 2003, P 19 ANN COMP SEC AP
[8]
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
[9]
Using model checking to analyze network vulnerabilities
[J].
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2000,
:156-165
[10]
Automated generation and analysis of attack graphs
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:273-284