Computer Science ›› 2013, Vol. 40 ›› Issue (4): 152-154.
Previous Articles Next Articles
LI Qing-peng,WANG Bu-hong,WANG Xiao-dong and ZHANG Chun-ming
[1] 陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,1(4):838-848 [2] 司加全,张冰,苘大鹏,等.基于攻击图的网络安全性增强策略制定方法[J].通信学报,2009,0(2):123-128 [3] Sheyner O,Haines J,Jha S.Automated generation and analysis of attack graphs[C]∥Proc 2002IEEE Symposium on Security and Privacy.Oakland,California,USA,2002:254-265 [4] Jha S,Sheyner O,Wing J.Two Formal Analyses of AttackGraphs[C]∥Proceedings of the 15th IEEE Computer Security [5] Colorni A,Dorigo M,Maniezzo V.Distributed optimization by ant colonies[C]∥Varela F,Bourgine P.Proc of the ECAL’91European Conf of Artificial Life.Paris:Elsevier,1991:134-144 [6] 杜占玮,杨永健,孙永雄,等.基于互信息的混合蚁群算法及其在旅行商问题上的应用[J].东南大学学报:自然科学版,2011,1(3):478-481 [7] 李琳,刘士新,康加福.改进的蚁群算法求解带时间窗的车辆路径问题[J].控制与决策,2010,5(9):1379-1383 [8] 胡耀民,刘伟铭.基于改进型蚁群算法的最优路径问题求解[J].华南理工大学学报:自然科学版,2010,8(10):105-110 [9] 汪立东.操作系统安全评估和审计增强[D].哈尔滨:哈尔滨工业大学计算机科学与技术学院,2002 [10] 彭俊好,徐国爱,杨义先,等.基于效用的安全风险度量模型[J].北京邮电大学学报,2006,29(2):6-9 |
No related articles found! |
|