A Revised Attack Taxonomy for a New Generation of Smart Attacks
暂无分享,去创建一个
[1] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[2] Ronald D. Williams,et al. Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.
[3] Magnus Almgren,et al. Consolidation and Evaluation of IDS Taxonomies , 2003 .
[4] N. Paulauskas,et al. Computer System Attack Classification , 2006 .
[5] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[6] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[7] Gabi Dreo Rodosek,et al. Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 , 2013, CSS.
[8] Gonzalo Álvarez,et al. A new taxonomy of Web attacks suitable for efficient encoding , 2003, Comput. Secur..
[9] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[10] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[11] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[12] Peter Loos,et al. Classification of reference models: a methodology and its application , 2003, Inf. Syst. E Bus. Manag..
[13] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[14] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[15] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.