共 13 条
- [1] Ammann P, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P64
- [2] Ammann P., 2002, Proceedings of the 9th ACM Conference on Computer and Communications Security, P217, DOI DOI 10.1145/586110.586140
- [3] [Anonymous], 2001, A taxonomy of computer attacks with applications to wireless networks
- [5] BONEH D, 1997, P 15 INT C THEOR APP, V1233, P307
- [6] Iyer R. K., 2003, Proceedings. Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, P331
- [7] POWER-HIERARCHY OF DEPENDABILITY-MODEL TYPES [J]. IEEE TRANSACTIONS ON RELIABILITY, 1994, 43 (03) : 493 - 502
- [8] Ou XM, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P113
- [9] Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
- [10] Using model checking to analyze network vulnerabilities [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 156 - 165