共 25 条
[21]
SARDAL K, 2004, LECT NOTES COMPUTER
[22]
SCHEINER B, 1999, DOBBS J DEC
[23]
Automated generation and analysis of attack graphs
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:273-284
[24]
SWILER LP, 2001, IEEE S SEC PRIV
[25]
YUILL J, 1999, RAID S