Network-Theory_Compliance-G.../Report/Schrick-Noah_CS-7863_Final-Report.bbl

14 lines
446 B
Plaintext

\begin{thebibliography}{1}
\bibitem{phillips_graph-based_1998}
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
F1292, pp.~71--79, 1998.
\newblock doi: 10.1145/310889.310919.
\bibitem{schneier_modeling_1999}
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
\newblock vol. 24, no.12.
\end{thebibliography}