共 63 条
- [41] Pearl J., 1982, P NAT C ART INT, P133, DOI DOI 10.1038/4580
- [42] Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71
- [44] Understanding Network Forensics Analysis in an Operational Environment [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
- [45] Schneier B, 1999, DR DOBBS J, V24, P21
- [46] Schuster-Bockler Benjamin, 2007, Curr Protoc Bioinformatics, VAppendix 3, p3A, DOI 10.1002/0471250953.bia03as18
- [47] Shafer G., 1990, ANN MATH ARTIFICIAL, V2, P327, DOI DOI 10.1007/BF01531015
- [48] Sharma A, 2011, I C DEPEND SYS NETWO, P506, DOI 10.1109/DSN.2011.5958263
- [49] Sheyner O, 2003, LECT NOTES COMPUT SC, V3188, P344
- [50] Automated generation and analysis of attack graphs [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 273 - 284