3Ramakrishnan C,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security,2002,10(1-2):189-209.
4Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proceedings of the IEEE Symposium on Security and Privacy,Washington.May2001:156-165.
5Sheyner O,Haines J,Jha S,et al.Automated generation and analysis of attack graphs.In:Proceedings of IEEE Symposium on Security and Privacy,Oakland.May 2002:273-284.
6Sheyner O.Scenario graphs and attack graphs:[Ph.D Thesis].Pittsburgh:School of Computer Science Carnegie Mellon University,2004.
7Ritchey R,Oberry B,Noel S.Representing TCP/IP connectivity for topological analysis of network security.In:Proceeding of 18th Annual Computer Security Applications Conference,Las Vegas,Nevada.December 2002:25-31.