共 27 条
[1]
[Anonymous], 2005, ANNOTATED REV PAPERS
[2]
[Anonymous], NESSUS SECURITY SCAN
[3]
[Anonymous], BuDDy, a binary decision diagram package
[4]
[Anonymous], UCAMCLTR746
[6]
*IBM GLOB TECHN SE, 2009, IBM INT SEC SYST X F
[7]
Practical attack graph generation for network defense
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:121-+
[8]
JAJODIA S, 2003, TOPOLOGICAL ANAL NET, pCH5
[9]
Khakpour A., 2009, MSUCSE092
[10]
Lippmann R., 2006, IEEE MIL COMM C MILC