共 11 条
[1]
AMMANN P, 2005, COMP SEC APPL C 21 A, P10
[2]
Ammann P., 2002, P 9 ACM C COMP COMM
[3]
Practical attack graph generation for network defense
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:121-+
[4]
Jajodia S., 2003, MANAGING CYBER THREA, pCH5
[5]
NOEL S, 2003, 19 ANN COMP SEC APPL
[6]
NOEL S, 2004, VIZSEC DMSEC 04 P 20, P109
[7]
NOEL S, 2005, COMP SEC APPL C 21 A, P72
[8]
Norvig P, 1995, ARTIFICIAL INTELLIGE
[9]
Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71
[10]
Using model checking to analyze network vulnerabilities
[J].
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2000,
:156-165