Attack-based Domain Transition Analysis
暂无分享,去创建一个
[1] Joshua D. Guttman,et al. Verifying Information Flow Goals in , 2004 .
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Mark Burgess,et al. Archipelago: A Network Security Analysis Tool , 2003, LISA.
[5] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.