ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies
暂无分享,去创建一个
[1] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[2] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[3] Eugene H. Spafford,et al. Use of A Taxonomy of Security Faults , 1996 .
[4] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[5] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[6] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[7] R. P. Abbott,et al. Security Analysis and Enhancements of Computer Operating Systems , 1976 .
[8] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[10] Angelos Stavrou,et al. Towards a Cyber Conflict Taxonomy , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[11] Maria Kjaerland,et al. A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..
[12] John A. Stankovic,et al. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.
[13] William A. Arbaugh,et al. IEEE 52 Computer , 1985 .
[14] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[15] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[16] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .