[1] Ritchey R W, Ammann P. Using Model Checking to Analyze Network Vulnerabilities[C]//Proc. of the IEEE Symp. on Security and Privacy. Oakland, California, USA: [s. n.], 2001.
[2] Ou Xinming, Boyer W F. A Scalable Approach to Attack Graph Generation[C]//Proc. of the 13th ACM Conf. on Computer and Communications Security. [S. l.]: ACM Press, 2006.
[3] 孙 亮, 李 东, 张 涛. 网络攻击图的自动生成[J]. 计算机应用研究, 2006, 23(3): 119-122.
[4] 苘大鹏, 张 冰, 周 渊, 等. 一种深度优先的攻击图生成方法[J]. 吉林大学学报: 工学版, 2009, 39(2): 447-451.
[5] Jajodia S, Noel S. Topological Analysis of Network Attack Vul- nerability[M]. Dordrecht, Netherlands: Kluwer Academic
Publisher, 2003.
[6] Ammann P, Wijesekera D, Kaushik S. Scalable, Graph-based Net- work Vulnerability Analysis[C]//Proc. of the 9th ACM Conf. on Computer and Communications Security. [S. l.]: ACM Press, 2002.
[7] 毛捍东, 陈 锋, 张维明. 网络组合攻击建模方法研究进展[J].计算机科学, 2007, 34(11): 50-54.
[8] Dawkins J, Hale J. A Systematic Approach to Multistage Network Attack Analysis[C]//Proc. of the 2nd IEEE Int’l Information Assurance Workshop. Charlotte, USA: [s. n.], 2004.
[9] 赵芳芳, 陈秀真, 李建华. 基于权限提升的网络攻击图生成方法[J]. 计算机工程, 2008, 34(23): 158-160.
[10] 郝克刚, 丁剑洁. 层次结构的Petri网[J]. 计算机科学与探索, 2008, 2(2): 123-130.
[11] 冯萍慧, 连一峰, 戴英侠, 等. 面向网络系统的脆弱性利用成本估算模型[J]. 计算机学报, 2006, 29(8): 1375-1381.
[12] Pemmasani G. Online Justification for Tabled Logic Programs[C]// Proc. of the 7th Int’l Symp. on Functional and Logic Programming. Nara, Japan: [s. n.], 2004.
[13] 赵博夫, 殷肖川. 基于Petri网的网络攻击流模型研究[J]. 计算机工程, 2011, 37(4): 158-160. |