共 63 条
- [31] Li WH, 2006, SER ADV BIOINFORM, V3, P1
- [32] Lippmann R, 2006, MILCOM 2006, VOLS 1-7, P3720
- [33] Network vulnerability assessment using Bayesian networks [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
- [34] Lord N., 2015, The history of data breaches
- [36] Murphy KP, 1999, UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, P467
- [37] Efficient minimum-cost network hardening via exploit dependency graphs [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 86 - 95
- [38] Noel S., 2004, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, P109
- [40] Pearl J., 1988, Morgan Kaufmann series in representation and reasoning, DOI DOI 10.1016/C2009-0-27609-4