共 20 条
[1]
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[3]
Chess D. M., 2000, VIR B C SEPT
[4]
Cohen F., 1989, Computers & Security, V8, P325, DOI 10.1016/0167-4048(89)90089-8
[5]
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[6]
Cook S. A., 1971, P 3 ANN ACM S THEOR, P151, DOI [DOI 10.1145/800157.805047, 10.1145/800157.805047]
[7]
Cowan C., 2000, P DARPA INF SURV C E, VVolume 2, P119
[8]
DENNING PJ, 1988, AM SCI MAY, P236
[9]
Duff T., 1989, Computing Systems, V2, P155
[10]
Eichin M. W., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P326, DOI 10.1109/SECPRI.1989.36307