Security Holes . . . Who Cares?
暂无分享,去创建一个
[1] Niels Provos,et al. ScanSSH: Scanning the Internet for SSH Servers , 2001, LISA.
[2] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[3] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[4] C. R. Bilson. Design for Library , .
[5] Ken Harrenstien,et al. Nicname/whois , 1982, RFC.
[6] William A. Arbaugh,et al. A trend analysis of exploitations , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Ross Ihaka,et al. Gentleman R: R: A language for data analysis and graphics , 1996 .
[8] Matthias Schroder,et al. Logistic Regression: A Self-Learning Text , 2003 .
[9] David W. Hosmer,et al. Applied Logistic Regression , 1991 .
[10] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[11] Crispin Cowan,et al. Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.