Vulnerability Analysis of Intelligent Network System
暂无分享,去创建一个
[1] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[2] M. P. Ristenbatt. Methodology for network communication vulnerability analysis , 1988, MILCOM 88, 21st Century Military Communications - What's Possible?'. Conference record. Military Communications Conference.
[3] Cun-Hui Zhang,et al. Measures of Network Vulnerability , 2007, IEEE Signal Processing Letters.
[4] Tyler Moore,et al. Securing SS7 Telecommunications Networks , 2001 .
[5] Stephen D. Wolthusen,et al. Modeling and execution of complex attack scenarios using interval timed colored Petri nets , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[6] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[7] Michel Cukier,et al. Automated checking for Windows host vulnerabilities , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[8] Gavin W. Manes,et al. Network vulnerability analysis , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..
[9] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[10] Rasool Jalili,et al. Using Description Logics for Network Vulnerability Analysis , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[11] Tyler Moore,et al. Signaling system 7 (SS7) network security , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..