Computer Science ›› 2014, Vol. 41 ›› Issue (7): 119-121.doi: 10.11896/j.issn.1002-137X.2014.07.024
Previous Articles Next Articles
JIAO Jian and CHEN Xin
[1] Schneier B.Secrets and Lies:Digital Security in a NetworkedWorld [M].New York,USA:John Wiley & Sons,2000 [2] Man Da-peng,Zhang Bing,Yang Wu,et al.A method for global attack graph generation [C]∥Proceedings of 2008IEEE International Conference on Networking,Sensing and Control.Sanya,China:IEEE Computer Society Press,2008:236-241 [3] Phillips C,Laura S P.A graph-based syatem for network vulnerability analysis[C]∥Proceedings of the 1998Workshop on New Securityparadigms.VA,USA:ACM,1998:71-79 [4] Wang Da-zhi,Bharat B M,Kishor S.Security analysis of SITAR intrusi on tolerance system [C]∥Proceedings of the 2003Workshop on Survivable and Self-Regenerative Systems,in Association with 10th ACM Conference on Computer and Communications Security 2003.New York,USA:Association for Computing Machinery,2003:23-32 [5] Wang Fei-yi,Jou F,Gong Feng-min,et al.SITAR:Scalable in trusion tolerance architecture for distributed services [C]∥Proceedings of the IEEE Second SMCInform at ion Assurance Workshop.West Point,New York,USA:IEEE Press,2001:38-45 [6] Singh S,Cukier M,Sanders W H.Probabilistic validation of an intrusion tolerant replication system [C]∥Proceedings of the International Conference on Dependable Systems and Networks.San Francisco,USA:IEEE Press,2003:616-624 [7] 杨宏宇,江华.基于攻击图的多Agent网络安全风险评估模型[J].计算机科学,2013,40(2):148-152 [8] Swiler L P,Phillips C,Gaylor T.A Graph-Based Network-Vulnerability Analysis System[C]∥Technical Report SAND97-3010/1,Sandia National Laboratories.Albuquerque,New Mexico and Livermore,California,1998 [9] Ammann P,Wijesekera D,Kaushik S.Scalable Graph-BasedNetwork Vulnerability Analysis[C]∥Proceedings of the 9th ACM Conference on Computer and Communications Security.New York:ACM Press,2002:217-224 [10] 张冬艳,陈红松.基于随机Petri网的容灾系统安全性分析[J].清华大学学报:自然科学版,2011,1(10):1281-1286 [11] Cynthia P,Laura P S.A graph-based system for network-vulnerability analysis system[C]∥ACM New Security Paradigms Workshop.1998 [12] Jha S,Sheyner O,Wing J M.Minimization and reliability analyses of attack graphs [R].Technical Report CMUCS-02-109.Carnegie Mellon University,February 2002 [13] Jajodia S,Noel S,O’Berry B.Topological analysis of networkattack vulnerability[C]∥Managing Cyber Threats:Issues,Approaches and Challenges.Springer-Verlag,2005:248-266 [14] Ou Xin-ming,Boyer W F,McQueen M A.A Scalable Approach to Attack Graph Generation[C]∥CCS’06.Alexandria,Virginia,USA,2007:336-345 |
No related articles found! |
|