共 56 条
[2]
[Anonymous], 2003, Linear programming 2: theory and extensions
[3]
[Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
[4]
[Anonymous], P 2002 UK WORKSH COM
[5]
[Anonymous], 2001, CMUSEI2001TN001
[7]
Automatic Security Assessment of Critical Cyber-Infrastructures
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC,
2008,
:366-375
[8]
Bartz-Beielstein T, 2003, IEEE C EVOL COMPUTAT, P1780
[9]
Butler S., 2002, COMPUTER INFORM SCI, V94, P187
[10]
Butler ShawnA., 2002, ICSE 2002 P 24 INT C, P232, DOI DOI 10.1145/581339.581370