共 30 条
[1]
[Anonymous], 2007, 1 FORUM INCIDENT RES
[2]
[Anonymous], 2014, Nessus vulnerability scanner v6.0
[3]
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[4]
Aven T., 2009, International Journal of Performability Engineering, V5, P447
[5]
Barnum Sean., 2007, Attack Patterns as a Knowledge Resource for Building Secure Software
[6]
Chen WangK. Pongaliur Li Xiao., 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, P806
[7]
Risk management using behavior based attack graphs
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:445-449
[8]
Dawkins J., 2002, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, P75
[9]
Frigault Marcel, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P698, DOI 10.1109/COMPSAC.2008.88
[10]
Gallon L., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P59, DOI 10.1109/ARES.2011.18