共 23 条
[1]
[Anonymous], 2006, 13 ACM C COMP COMM S
[2]
[Anonymous], J NETWORK SYSTEMS MA
[3]
Ceri S., 1989, IEEE Transactions on Knowledge and Data Engineering, V1, P146, DOI 10.1109/69.43410
[4]
On solving covering problems
[J].
33RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 1996,
1996,
:197-202
[5]
Dewri R., 2007, 14 ACM C COMP COMM S
[6]
FU Z, 2006, P INT C COMP AID DES
[7]
Fu ZH, 2006, LECT NOTES COMPUT SC, V4121, P252
[8]
Ingols Kyle, 2006, 22 ANN COMP SEC APPL
[9]
Jajodia S., 2003, MANAGING CYBER THREA, pCH5
[10]
Two formal analyses of attack graphs
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:49-63