Scenario Graphs Applied to Security ( Summary Paper )
暂无分享,去创建一个
[1] Pierre Wolper,et al. Simple on-the-fly automatic verification of linear temporal logic , 1995, PSTV.
[2] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[3] Frank D. Valencia,et al. Formal Methods for Components and Objects , 2002, Lecture Notes in Computer Science.
[4] Fausto Giunchiglia,et al. NUSMV: a new symbolic model checker , 2000, International Journal on Software Tools for Technology Transfer.
[5] Shin Nakajima,et al. The SPIN Model Checker : Primer and Reference Manual , 2004 .
[6] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[7] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[8] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[9] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Oleg Sheyner,et al. Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.
[11] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[12] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[13] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .