Security challenges in IT infrastructure for cybersecurity curriculum support
暂无分享,去创建一个
[1] Ed Crowley. Open source, live CD based, security lab design: tutorial presentation , 2006 .
[2] Victor Piotrowski. NSF investments in cybersecurity research and education , 2011, CSIIRW '11.
[3] Shari Lawrence Pfleeger,et al. Anatomy of an Intrusion , 2010, IT Professional.
[4] Ernest McDuffie,et al. NICE: National Initiative for Cybersecurity Education , 2011, CSIIRW '11.
[5] Andrew Smith,et al. Large Scale Delivery of Cisco Networking Academy Program by Blended Distance Learning , 2010, 2010 Sixth International Conference on Networking and Services.
[6] Corey D. Schou,et al. A Model for Information Assurance : An Integrated Approach , 2001 .
[7] Gurdip Kaur,et al. Intrusion detection system using honeypots and swarm intelligence , 2011, ACAI '11.
[8] Mario Reyes-Ayala,et al. Design and implementation of a VLAN , 2010 .
[9] Julia H. Allen,et al. Governing for Enterprise Security , 2005 .
[10] John A. Stankovic,et al. Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .
[11] Raheem Beyah,et al. Invisible Trojan: an architecture, implementation and detection method , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..
[12] Weiqing Sun,et al. V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments , 2008, CSET.
[13] Salah Alabady. Design and Implementation of a Network Security Model for Cooperative Network , 2009, Int. Arab. J. e Technol..
[14] Stefano Zanero. Wireless Malware Propagation: A Reality Check , 2009, IEEE Security & Privacy.
[15] Seiji Munetoh,et al. Designing a trust chain for a thin client on a live Linux cd , 2007, SAC '07.
[16] Melanie Bernier,et al. An overview of cyber attack and computer network operations simulation , 2011, SpringSim.