共 37 条
[1]
Anderson G., 2015, HENNESSY MILNE UNPUB
[2]
Beautement A., 2008, MANAGING INFORM RISK, P141
[3]
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window
[J].
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2008,
:33-42
[4]
Beresnevichiene Y., 2010, NOMS 2010 - 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, P118, DOI 10.1109/NOMSW.2010.5486590
[6]
Birtwistle G., 1987, DISCRETE EVENT MODEL
[8]
Caulfield Tristan, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P233, DOI 10.1007/978-3-319-07620-1_21
[9]
Caulfield T., 2015, P 8 SIMUTOOLS
[10]
Chellas B. F., 1980, Modal Logic: An Introduction