共 13 条
[1]
Ammann P., 2002, 9 ACM C COMPUTER COM, DOI DOI 10.1145/586110.586140
[2]
[Anonymous], 2003, Practical UNIX and internet Security
[3]
Dacier M., 1996, 96493 LAAS
[4]
DECHTER R, 1999, GRAPH MODELS, P75
[5]
Frey B. J., 1998, ADAP COMP MACH LEARN
[6]
Two formal analyses of attack graphs
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:49-63
[7]
JORDAN MJ, 1999, GRAPHICAL MODELS
[9]
PEARLMAN J, 1988, PROBABILISTIC REASON
[10]
Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71