[1]Sheyner O,Haines J,Jha S,et al.Automated Generation and Analysis of Attack Graphs[C]∥Proc of 2002 IEEE Symp on Security and Privacy,2002:254265.
[2]Ou Xinming, Boyer W F, McQueen M A. A Scalable Approach to Attack Graph Generation[C]∥Proc of the 13th ACM Conf on Computer and Communications Security, 2006:336345.
[3]Ou Xinming. A LogicProgramming Approach to Network Security Analysis:[Ph D Dessertation][D]. Princeton:Princeton University,2005.
[4]Li Wei. An Approach to GraphBased Modeling of Network Exploitations:[Ph D Dissertation][D]. Mississippi State, Mississippi:Department of Computer Science and Engineering, Mississippi State University, 2005.
[5]Ammann P, Wijesekera D, Kaushik S. Scalable, GraphBased Network Vulnerability Analysis[C]∥Proc of the 9thACM Conf on Computer and Communications Security,2002:217224.
[6]Jajodia S, Noel S, O’Berry B. Topological Analysis of Network Attack Vulnerability[M]∥Kumar V,Srivastava J, Lazarevic A, eds.Managing Cyber Threats: Issues, Approaches and Challenges.Boston:Kluwer Academic Publisher, 2003:34.