攻击文法与攻击图模型的对比
作者:张殷乾, 王轶骏, 薛质, ZHANG Yinqian, WANG Yijun, XUE Zhi
作者单位:上海交通大学,信息安全工程学院,上海,200240
刊名:
辽宁工程技术大学学报(自然科学版)
英文刊名:JOURNAL OF LIAONING TECHNICAL UNIVERSITY(NATURAL SCIENCE)
年,卷(期):2008,27(6)
1.Phillips C;Swiler L A Graph-Based System for Network-Vulnerability Analysis 1998
2.Yinqian Zhang;Xun Fan;Yijun Wang Attack Grammar:A New Approach to Modeling and Analyzing Network Attack Sequences 2008
3.Ingols K;Lippmann R;piwowarski K Practical Attack Graph Generation for Network Defense 2006
4.Ou X;Govindavajhala S Appel A MulVAL:A Logic-Based Network Security Analyzer 2005
5.Xinming Ou;Wayne F,Boyer A Scalable Approach to Attack Graph Generation 2006
6.Sheyner O Automated Generation And Analysis of Attack Graphs" 2002
7.Ritchey R.W;Ammannm P Using Model Checking to Analyze Network Vulnerabilities 2000
8.Lippmann R P Validating And Restoring Defense in Depth Using Attack Graphs 2006
9.Jajodia S;Noel S;O'Berry B Topological Analysis of Network Attack Vulnerability,Managing Cyber Threats:Issues,Approaches and Challenges 2003
10.Swiler L;Phillips C;Ellis D Computer-Attack Graph Generation Tool 2001
本文链接:/Periodical_lngcjsdxxb200806029.aspx。