共 19 条
[1]
[Anonymous], 2006, Proceedings of the 2nd ACM workshop on Quality of protection
[2]
Dantu R, 2005, LECT NOTES COMPUT SC, V3495, P115
[3]
Dupont P., 1977, REND SEM MAT U POLIT, V36, P125
[4]
Idika N., 2009, P TAPIA 09 R TAP CEL
[5]
Practical attack graph generation for network defense
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:121-+
[6]
Jha S., 2002, P 15 IEEE COMP SEC F
[7]
Jonsson E., 1997, IEEE T SOFTWARE ENG
[8]
Li W., 2006, P 6 IEEE INT S CLUST
[9]
Lippmann R., 2006, P MIL COMM C OCT