2SWILER L P,PHILLIPS C. A Graph-based System for Netwodc Vulnerability Analysis Report[ C ] //Proc, of ACM Workshop on New Security Paradigms. [ S. 1. ] :ACM Pmss,2008.
3AMMANN P, WIJESEKERA D, KAUSHIK S. Scalahle Cmaph-based NetworkVulnerability Analysis[ C ]//Proc, of ACM Confen: nce on Computer and Communications Security. [ S. L] :ACM Press,2002:217-224.
4KYLE I, RICHARD L. KEITH P. Practical Attack Graph Generation for Network Defense [ C ]//Proc. of Annual Computer Security Applications Conference. Miami Beach,USA: [ s. n. ] ,2006:121- 130.