共 21 条
[11]
NIST, COMM WEAKN EN CWE
[12]
NIST, National vulnerability database
[13]
Ou XM, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P113
[14]
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
[15]
Using model checking to analyze network vulnerabilities
[J].
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2000,
:156-165
[16]
Sheyner O, 2003, LECT NOTES COMPUT SC, V3188, P344
[17]
SHOOMAN M, 1990, PROBABILISTIC RELIAB
[18]
*SIEM, WINAC
[19]
Sufatrio, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTEENTH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE, P47
[20]
Yaghmour K., 2001, ADAPTIVE DOMAIN ENV