Author:
Liu Chungang,Li Jianhua,Chen Xiuzhen
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. CERT Statistics (1995-2208),
http://www.cert.org/stats/
2. Foreman, P.: Vulnerability Management. Taylor & Francis Group (2010)
3. Baldwin, R.: Rule based analysis of computer security, Technical Report TR-401, MIT LCS Lab (1988)
4. Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A logic-based network security analyzer. In: 14th USENIX Security Symposium, Society for Industrial and Applied Mathematics (2005)
5. Vache, G.: Vulnerability analysis for a quantitative security evaluation. In: Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement (2009)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献