共 27 条
- [1] [Anonymous], 2005, ANNOTATED REV PAPERS
- [2] [Anonymous], NESSUS SECURITY SCAN
- [3] [Anonymous], BuDDy, a binary decision diagram package
- [4] [Anonymous], UCAMCLTR746
- [6] *IBM GLOB TECHN SE, 2009, IBM INT SEC SYST X F
- [7] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [8] JAJODIA S, 2003, TOPOLOGICAL ANAL NET, pCH5
- [9] Khakpour A., 2009, MSUCSE092
- [10] Lippmann R., 2006, IEEE MIL COMM C MILC