Author:
Liu Peng,Jia Xiaoqi,Zhang Shengzhi,Xiong Xi,Jhi Yoon-Chan,Bai Kun,Li Jason
Reference32 articles.
1. http://www.squid-cache.org
.
2. http://www.milw0rm.com/exploits/347
.
3. http://www.loadtestingtool.com/
.
4. P. Ammann, S. Jajodia, and P. Liu. Recovery from malicious transactions. 14(5):1167–1185, 2002.
5. P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In CCS ’02: Proceedings of the 9th ACM conference on Computer and communications security, pages 217–224, Washington, DC, USA, 2002. ACM.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献