共 37 条
[2]
[Anonymous], DOBBS J DEC
[3]
[Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
[4]
[Anonymous], 2001, CMUSEI2001TN001
[5]
[Anonymous], P 15 ACM C COMP COMM
[6]
Arora A., 2004, IT Professional, V6, P35, DOI 10.1109/MITP.2004.89
[7]
BERGER B, 2003, DATA CENTRIC QUANTIT
[8]
Butler S.A., 2002, P SREIS02 CONJ 10 IE
[9]
Butler ShawnA., 2002, ICSE 2002 P 24 INT C, P232, DOI DOI 10.1145/581339.581370
[10]
Risk management using behavior based attack graphs
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:445-449