共 5 条
[1]
A Comprehensive Approach to Intrusion Detection Alert Correlation..Fredrik Valeur;Giovanni Vigna; etc;.IEEE Transactions on dependable and secure computing.2004, 03
[2]
Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances..Noel S;Jajodia S;.Proceedings of the 20th Annual Computer Security Application Conference.2004,
[3]
Graph-based algorithms for boolean function manipulation..Bryant R;.IEEE Trans. Comput.1986,
[4]
A scalable approach to attack graph generation..Ou X;Boyer W;McQueen M;.Proceedings of the 13th ACM conference on computer and communications security.2006,

