共 30 条
[1]
[Anonymous], 1981, Lecture Notes in Computer Science, DOI DOI 10.1007/BFB0025774
[2]
Pareto efficient solutions of attack-defence trees
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2015, 9036
:95-114
[3]
Model Checking Exact Cost for Attack Scenarios
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:210-231
[4]
Audinot M., 2017, ABS170608507 CORR
[5]
On the Soundness of Attack Trees
[J].
GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016,
2016, 9987
:25-38
[6]
Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
[7]
De Giacomo Giuseppe., 2013, P 23 IJCAI, P854, DOI 10.5555/2540128.2540252
[8]
Modelling Attack-defense Trees Using Timed Automata
[J].
FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016,
2016, 9884
:35-50
[9]
Garey Michael R, 2002, COMPUTERS INTRACTABI, V29