YANG Kuo-zhao, JIANG Fan. Design and realization of vulnerability testing system by imitating attack[J]. Journal of Computer Applications, 2005, 25(07): 1562-1564.
[12]LOWERY J. Penetration Testing: The Third Party Hacker [EB/OL]. http://rr.sans.org/, 2002-02.
[13]SHARM A, MARTIN JR, ANANAD N, et al. Ferret: A Host Vulnerability Checking Tool [A]. Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'04) [C], 2004.
[14] KOTENKO I. Active Vulnerability Assessment of Computer Networks by Simulation of Complex Remote Attacks [A]. Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC03) [C], 2003.