1. Zerkle, D., Levitt, K.: NetKuang – A Muti-Host Configuration Vulnerability Checker. In: Proceedings of the sixth USENIX UNIX Security Symposium, San Jose, CA (1996)
2. Lecture Notes in Computer Science;M. Dacier,1994
3. Ritchey, R.W., Ammann, P.: Using Model Checking to Analyze Network Vulnerabilities. In: Proceedings of IEEE Symposium on Security and Privacy, May 2001, pp. 156–165 (2001)
4. Ramakrishnan, C.R., Sekar, R.: Model-Based Analysis of Configuration Vulnerabilities. Journal of Computer Security 10(1/2), 189–209 (2002)
5. Shahriari, H.R., Jalili, R.: Using CSP to Model and Analyze Transmission Control Vulnerabilities within the Broadcast Network. In: Proceedings of the IEEE International Networking and Communication Conference (INCC 2004), June 2004, pp. 42–47 (2004)