共 20 条
[1]
Arbaugh WA, 2000, COMPUTER, V33, P52, DOI 10.1109/2.889093
[3]
Arora A., 2006, 5 WORKSH EC INF SEC
[4]
ARORA A, 2006, INT C INF SYST ICIS
[7]
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233
[8]
A trend analysis of exploitations
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:214-229
[9]
CAVUSOGLU H, 2004, P 14 WORKSH INF TECH
[10]
CAVUSOGLU H, 2005, SECURITY PATCH MANAG