共 10 条
[1]
企业信息管理云平台的设计与实现[J] 杜庆灵; 通信技术 2012, 06
[2]
[3]
[4]
[5]
[6]
Web应用威胁建模与定量评估[J] 王红兵; 清华大学学报(自然科学版) 2009, S2
[7]
[8]
[9]
Model‐based analysis of configuration vulnerabilities[J] C.R. Ramakrishnan;R. Sekar Journal of Computer Security 2002,
[10]
Using Model Checking to Analyze Network Vulnerabilities Ritchey R;Ammann P; Proceedings of IEEE Symposium on Security and Privacy 2000,

