共 7 条
[1]
HEBERLEIN L, 1990, P IEEE COMP SOC S RE
[2]
Approach of Non-optimum Analysis on Information Systems Security
[J].
2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS,
2009,
:225-228
[3]
Krgel C., 2002, P 2002 ACM S APPL CO, P201, DOI DOI 10.1145/508791.508835
[4]
PING H, 2004, J ENG SCI, V24, P73
[5]
QU ZT, 2009, J SOFTWARE, V4, P374
[6]
QU ZT, 2009, IEEE COMP SOC NT C C
[7]
Staniford S., 2002, Journal of Computer Security, V10, P105