5Li W, Vaughn R. An approach to model network exploitations using exploitation graphs[C].San Diego, California:Proceedings of the Spring Simulation Multiconference on Military, Govern- ment, and Aerospace Simulation Symposium,2005:237-244.
6Li W, Vaughn R.Building compact exploitation graphs for a clus- ter computing environment[C].Proceedings of the 6th IEEE In- formation Assurance Workshop. New York: IEEE SMC, IEEE Computer Society and National Security Agency,2005:50-57.
7Ammann P, Wijesekera D,Kaushik S.Scalable, graph-based net-work vulnerability analysis [C]. Proceedings of the 9th ACMConference on Computer and Communications Security. Was-hington DC:ACM,2002:217-224.
8Tidwell T, Larson R,Fitch K,et al.Modeling Intemet attacks[C].Proceedings of the IEEE Workshop on Information Assuranceand Security.West Point, NY:United States Military Academy,2001:54-59.
9Rumbaugh J, Jacobson I, Booch G. The unified modeling lan-guage user guide [M]. Addison Wesley Longman Inc, PearsonEducation,1999:3-4.