共 37 条
[11]
Dantu Ram, 2007, 2007 IEEE Intelligence and Security Informatics, P71, DOI 10.1109/ISI.2007.379536
[13]
Dawkins J., 2002, P WORKSH STAT MACH T
[15]
Dewri R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P204
[16]
Frigault Marcel, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P698, DOI 10.1109/COMPSAC.2008.88
[17]
Frigault M., 2008, P 14 ACM WORKSH QUAL
[18]
Goldberg DE., 1989, GENETIC ALGORITHMS S, V13
[20]
Two formal analyses of attack graphs
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:49-63