[1]
Ritchey R. W, AmmannP. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, Oakland, CA, 2000, 156-161.
DOI: 10.1109/secpri.2000.848453
Google Scholar
[2]
Templeton S.J. Levitt K. A requiresprovides model for computer attacks . In: Proceedings of the New Security Paradigms Workshop 2000, Cork Ireland, 2000, 31-40.
Google Scholar
[3]
http: /www. cioage. com/art/200706/46725. htm Predict threat of the information system security vulnerability analysis technique.
Google Scholar
[4]
Duan Yunsuo, Liu Xin, Chen Zhong, Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation, Acta Scientiarum Naturalium Universitatis Pekinensis, No. 3 May 2005, 485-487.
Google Scholar
[5]
HU Hua-ping LIU Bo ZHONG Qiu-xi PANG Li-hui Study and Implementation of Network Security Vulnerabilities Analysis and Disposition System(NS VADS). Journal of National University of Defense Techology, CA, 2004, 26-29.
Google Scholar
[6]
DUAN Yunsuo LIU Xin CHEN Zhong Alalysis on Combined Securty Efficiency and Vulnerability for Information System Security Evaluation. Acta Scientianum Naturelium Universitatis Pekinensis, CA, 2005, 485-490.
Google Scholar
[7]
XING Xu Jia, LIN Chuang, JIANG Yi Xin. A Survey of Computer Vulnerabilities Assessment. Journal of Computer, CA, 2004(1), 27-30.
Google Scholar
[8]
XIN G Xin-Jia LIN Chuang J LANG Yi-Xin A Survey of Computer Vulnerabilities Assessment. Journal of Computer, CA, 2004, 27-30.
Google Scholar
[9]
Ramakrishnan C.R., Sekar R. Model-base analysis of configuration vulnerabilities. Journal of Computer Security and Privacy, Oakland, CA, 2002, 254-265.
Google Scholar