1Computer Oracle and Password System (COPS). ftp://coast.cs.purdue.edu/pub/tools/unix/scanners/cops. 2004
2Nessus. http://www.nessus.org/, 2005
3Moore A, Ellison R, Linger R. Attack Modeling for Information Security and Survivability. Technical Note, CMU/SEI-2001-TN-001. 2001
4Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of 9th ACM Conference on Computer and Communications Security, Washington. November 2002.214
5Sheyner O. Scenario Graphs and Attack Graphs:[PhD thesis]. Pittsburgh: School of Computer Science, Carnegie Mellon University, 2004
6Zhang Yongzheng, Yun Xiaochun. A new vulnerability taxonomy based on privilege escalation. In: Proceedings of the Sixth International Conference on Enterprise Information Systems Proceedings, Portugal. 2004.536
7Common Criteria for Information Technology Security Evaluation. 1999