共 10 条
[4]
On Stochastic Modeling for Integrated Security and Dependability Evaluation[J] . Karin Sallhammar,Bjarne E. Helvik,Svein J. Knapskog.Journal of Networks . 2006 (5)
[5]
Incentive-based modeling and inference of attacker intent, objectives, and strategies[J] . Peng Liu,Wanyu Zang,Meng Yu.ACM Transactions on Information and System Security (TISSEC) . 2005 (1)
[6]
Model‐based analysis of configuration vulnerabilities[J] . C.R. Ramakrishnan,R. Sekar.Journal of Computer Security . 2002 (1,2)
[7]
Towards Operational Measures of Computer Security[J] . Bev Littlewood,Sarah Brocklehurst,Norman Fenton,Peter Mellor,Stella Page,David Wright,John Dobson,John McDermid,Dieter Gollmann.Journal of Computer Security . 1993 (2-3)
[8]
UNILATERALLY COMPETITIVE GAMES
[J].
INTERNATIONAL JOURNAL OF GAME THEORY,
1992, 21 (03)
:291-299
[9]
Agame based analysis of the client puzzle approach to defend against DoS attacks .2 Bencsth B,Buttyn L,Vajda I. Pro-ceedings of the IEEE Conference on Software,Telecommuni-cations and Computer Networks (SoftCom2003) . 2003
[10]
A Structural Framework for Modeling Multi-Stage network attacks .2 Kristopher Daley,Ryan Larson,Jerald Dawkins. Proceedings of the International Conference on Parallel Processing Workshops . 2002