Towards New Areas of Security Engineering
暂无分享,去创建一个
[1] Jack Dongarra,et al. Computational Science — ICCS 2003 , 2003, Lecture Notes in Computer Science.
[2] ByungRae Cha,et al. Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation , 2005, ICCSA.
[3] Annabelle Lee,et al. SP 800-29. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 , 2001 .
[4] Béatrix Barafort,et al. Benefits Resulting from the Combined Use of ISO/IEC 15504 with the Information Technology Infrastructure Library (ITIL) , 2002, PROFES.
[5] David Taniar,et al. Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I , 2005, ICCSA.
[6] Tai-Hoon Kim,et al. Reliability Assurance in Development Process for TOE on the Common Criteria , 2003, SERA.
[7] Tai-hoon Kim. Approaches and Methods of Security Engineering , 2006 .
[8] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Tai-Hoon Kim,et al. Threat Description for the PP by Using the Concept of the Assets Protected by TOE , 2003, International Conference on Computational Science.