共 9 条
[1]
BASS T, 2000, P COMM ACM, P99, DOI DOI 10.1145/332051.332079
[2]
CARVER A, 2000, P IEEE SYST MAN CYB, P110
[3]
Lakkaraju Kiran., 2004, VIZSECDMSEC 04, P65, DOI DOI 10.1145/1029208.1029219
[4]
LIU F, 2004, P 3 INT C INF SEC TA, P244, DOI DOI 10.1145/1046290.1046349
[5]
LYE K, 2002, FDN COMP SEC WORKSH, P71, DOI DOI 10.1007/S10207-004-0060-X
[6]
Mu CP, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P1789
[7]
Efficient minimum-cost network hardening via exploit dependency graphs
[J].
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2003,
:86-95
[8]
SUDIT M, 2005, P SOC PHOTO-OPT INS, P114, DOI DOI 10.1117/12.606980
[9]
Wei HQ, 2005, PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, P506