共 14 条
- [1] An automated approach to generate Web applications attack scenarios [J]. 2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 78 - 85
- [2] A Graphical Model to Assess the Impact of Multi-Step Attacks [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 79 - 93
- [3] [Anonymous], 2006, P 13 ACM C COMPUTER, DOI DOI 10.1145/1180405.1180446
- [5] A systematic approach to multi-stage network attack analysis [J]. SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 48 - 56
- [6] DeLaBriandais R., 1959, MARCH 3 5 1959 W JOI, P295, DOI [10.1145/1457838.1457895, DOI 10.1145/1457838.1457895]
- [7] Jajodia S, 2005, MASSIVE COMP, V5, P247, DOI 10.1007/0-387-24230-9_9
- [8] An approach to model network exploitations using exploitation graphs [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2006, 82 (08): : 523 - 541
- [9] Robertson J., 2016, Cyber Defense Review, V1
- [10] Robertson J.J., 2016, Innovative Applications of Artificial Intelligence, V28