共 12 条
- [2] Chen L. B., 2011, JTSING HUA U, V51, P1519
- [3] Gong F., 2001, P DARPA INF SURV C E
- [4] Attack Graph Algorithm in the Application of Intrusion Detection System [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
- [6] Peng Wen-ling, 2005, Mini-Micro Systems, V26, P1296
- [7] Trivedi K. S., 2002, PROBABILITY STAT REL, V2nd
- [8] Wang T., 2015, REV COMPUTER ENG STU, V2, P9, DOI DOI 10.18280/RCES.020102
- [9] Yin Li-Hua, 2006, Chinese Journal of Computers, V29, P1505
- [10] Yin Li-hua, 2006, Journal of China Institute of Communications, V27, P131