共 23 条
[11]
Host-Centric Model Checking for Network Vulnerability Analysis
[J].
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2008,
:225-234
[12]
Hong J., 2012, P 10 AUSTR INF SEC M
[13]
Practical attack graph generation for network defense
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:121-+
[14]
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:117-126
[15]
Noel S, 2005, 21st Annual Computer Security Applications Conference, Proceedings, P145
[16]
Noel S., 2004, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, P109
[17]
Ou X., 2006, P 13 ACM C COMPUTER, P336, DOI DOI 10.1145/1180405.1180446
[20]
Sawilla RE, 2008, LECT NOTES COMPUT SC, V5283, P18