共 13 条
- [1] [Anonymous], 2011, Technical Report NIST Interagency Report 7788
- [2] [Anonymous], PROC 5 INT WORKSH
- [3] [Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
- [4] Cormen TH., 2009, Introduction to Algorithms, V3
- [5] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [6] Two formal analyses of attack graphs [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 49 - 63
- [7] Liu CW, 2012, IEEE INT WORKS INFOR, P121, DOI 10.1109/WIFS.2012.6412636
- [8] Mehta V, 2006, LECT NOTES COMPUT SC, V4219, P127
- [9] National Institute of Standards and Technology, NAT VULN DAT VERS 2
- [10] Ou X., 2006, P 13 ACM C COMPUTER, P336, DOI DOI 10.1145/1180405.1180446