共 23 条
- [11] Host-Centric Model Checking for Network Vulnerability Analysis [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 225 - 234
- [12] Hong J., 2012, P 10 AUSTR INF SEC M
- [13] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [14] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 117 - 126
- [15] Noel S, 2005, 21st Annual Computer Security Applications Conference, Proceedings, P145
- [16] Noel S., 2004, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, P109
- [17] Ou X., 2006, P 13 ACM C COMPUTER, P336, DOI DOI 10.1145/1180405.1180446
- [20] Sawilla RE, 2008, LECT NOTES COMPUT SC, V5283, P18