Implementation of a Generic ICT Risk Model using Graph Databases
暂无分享,去创建一个
Stefan Schauer | Gerald Quirchmayr | Johannes Göllner | Martin Latzenhofer | Christian Meurers | Thomas Benesch | Stefan Schiebeck | Brigitte Palensky | Ingo Mayr
[1] Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
[2] Jong Hyuk Park,et al. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats , 2014, Symmetry.
[3] Isaca. COBIT 5: Enabling Processes , 2012 .
[4] William A. Wulf,et al. TOWARDS A FRAMEWORK FOR SECURITY MEASUREMENT , 1997 .
[5] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[6] Kainan Chen. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state , 2017 .
[7] Stefan Schiebeck. An approach to continuous information security risk assessment focused on security measurements , 2014 .
[8] Bundesministerium des Innern. Polizeiliche Kriminalstatistik 2013 , 2014 .
[9] Thomas Schaberreiter,et al. A Bayesian network based on-line risk prediction framework for interdependent critical infrastructures , 2013 .
[10] Lars Juhl Jensen,et al. Are graph databases ready for bioinformatics? , 2013, Bioinform..
[11] Alan Mycroft,et al. Source-code queries with graph databases - with application to programming language usage and evolution , 2015, Sci. Comput. Program..
[12] Arun Prakash Agrawal,et al. Comparative analysis of Relational and Graph databases , 2013 .