SQUARE-Lite: Case Study on VADSoft Project
暂无分享,去创建一个
[1] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[2] Andrew P. Moore,et al. Trustworthy Refinement Through Intrusion-Aware Design , 2002 .
[3] Yvo Desmedt,et al. Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.
[4] Robin M. Ruefle,et al. Handbook for Computer Security Incident Response Teams (CSIRTs) , 2003 .
[5] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[6] Mitch Tulloch,et al. Microsoft Encyclopedia of Security , 2003 .
[7] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[8] Robert Etty,et al. Keith , 2008 .
[9] Edward Roback,et al. SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .
[10] Nancy R. Mead,et al. Survivable Network Systems: An Emerging Discipline , 1997 .
[11] Nancy R. Mead,et al. Requirements Engineering for Survivable Systems , 2003 .