共 11 条
- [1] AMMANN P, 2002, 9 ACM C COMP COMM SE
- [2] JAJODIA S, 2008, TOPOLOGICAL VULNERAB
- [3] NOEL S, 2004, WORKSH VIS DAT MIN C
- [4] Ou X., 2006, P 13 ACM CCS
- [5] Phillips C., 1998, NEW SEC PAR WORKSH
- [6] Using model checking to analyze network vulnerabilities [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 156 - 165
- [7] Sheyner Oleg, 2002, P IEEE S SEC PRIV
- [8] WANG L, 2006, DATA APPL SECURITY, V20
- [9] Minimum-cost network hardening using attack graphs [J]. COMPUTER COMMUNICATIONS, 2006, 29 (18) : 3812 - 3824
- [10] WILLIAMS L, 2007, WORKSH VIS COMP SEC