共 34 条
- [1] Ammann P., 2002, 9 ACM C COMPUTER COM, DOI DOI 10.1145/586110.586140
- [2] Berard B., 2001, SYSTEMS SOFTWARE VER
- [3] Chartrand G., 2016, GRAPHS DIGRAPHS
- [4] Modeling multistep cyber attacks for scenario recognition [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 284 - 292
- [5] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
- [6] DAS K, 2000, THESIS MIT
- [7] JAJODIA S, 2003, MANAGING CYBER THREA
- [8] Two formal analyses of attack graphs [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 49 - 63
- [9] DARPA information assurance program dynamic defense experiment summary [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 331 - 336
- [10] KUMAR S, 1995, THESIS PURDUE U W LA