On the shortest path to network security
暂无分享,去创建一个
[1] Rein Turn,et al. Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions , 1972, AFIPS '72 (Fall, part I).
[2] Laurence A. Wolsey,et al. Integer and Combinatorial Optimization , 1988, Wiley interscience series in discrete mathematics and optimization.
[3] M. I. Henig. The shortest path problem with two objective functions , 1986 .
[4] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[5] Lance J. Hoffman,et al. A shortest path network security model , 1993, Comput. Secur..
[6] William H. Murray,et al. TOWARD A MODEL OF SECURITY FOR A NETWORK OF COMPUTERS , 1992 .
[7] J. K. Millen,et al. The cascading problem for interconnected networks , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[8] Frederick S. Hillier,et al. Introduction of Operations Research , 1967 .
[9] Laurence A. Wolsey,et al. Integer and Combinatorial Optimization , 1988 .
[10] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[11] Nicos Christofides,et al. An algorithm for the resource constrained shortest path problem , 1989, Networks.
[12] John Alton Fitch. A network security model based on the resource constrained shortest path , 1993 .