لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
R. Derasion, [online], *'The Nessus Attack Scripting Language Reference Guide" ...
SANS Research Center, [online], «The SANS Top 20 Internet Security ...
Internet Security Systems, [online], "System scarrer information ', http://www. iss.ret. ...
Network Associates, [online], "CyberCop Scarner Information, ., http://ww. rai. c ...
D. Zerkle, and K. Levitt, "NetKuang - A Muti-Host Configuration ...
M. Dacier, Y. Deswarte, "Privilage Graph: An Extension to the ...
R.W. Ritchey and P. Ammann, "Using Model Checking to Analyze ...
A symbolic model checker, ' Available from: :SMV؛» [8] SMV, ...
C. R. Ramakrishnan ard R. Sekar, ،:Model-Based Analysis of Corfiguration ...
H. R. Shahriari, and R. Jalili, *Using CSP _ Model ...
M. Bishop, Computer Security: The Art and Science, Addison- Wesley, ...
P. Ammann, D. Wijesekera, S. Kaushik, *Scalable, Graph-Based Network Vulnerability ...
O. Sheyrer, J. Haines, S. Jha, R. Lippmann, J.Wing, 00Automated ...
S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network ...
S. Noel, E. Robertson, S. Jajodia, "Correlating Intrusion Everts and ...
S. Noel, S. Jajodia, "Managing Attack Graph Complexity through Visual ...
P. Ryan, S. Schneider, Modeling and Analysis of Security Protocols: ...
G. Rohrmair, G. Lowe, "Using CSP to detect Irsertion and ...
C. Phillips, L. Swiler, « A Graph-Based System for Network- ...
L. Swiler, C. Phillips, D. Ellis, S. Chakerian, "Computer Attack ...
A. Jores, R. Lipton, and L. Snyder, "A Linear Time ...
M. Bishop, 0#Hierarchical Take-Grart Protection Systems, Proc. 8th Symp. or ...
A. Jones, «Protection Mecharism Models: Their Usefulness, ' in Foundatiors ...
L. Sryder, _ the Synthesis and Analysis of Protection Systems, ...
M. Wu, 4Hierarchical Protection Systems, ' Proc. 1981 Symp. On ...
M. Bishop, 'Conspiracy and information flow in the Take-Grant Protectior ...
J. S. Shapiro, ،، The Practical Application of a Decidable ...
M. Bishop, D. Bailey, _ Critical Analysis of Vulnerability Taxonomies", ...
نمایش کامل مراجع