Requirements for a Future EWS - Cyber Defence in the Internet of the Future
暂无分享,去创建一个
[1] Peeter Laud,et al. Handling Encryption in an Analysis for Secure Information Flow , 2003, ESOP.
[2] Martin C. Libicki. Cyberdeterrence and Cyberwar , 2009 .
[3] John Arquilla,et al. Cyberwar is coming , 1993 .
[4] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[5] Kevin Knight,et al. Toward Distributed Use of Large-Scale Ontologies t , 1997 .
[6] Friedemann Mattern,et al. Vom Internet der Computer zum Internet der Dinge , 2010, Informatik-Spektrum.
[7] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[8] John W. Lockwood,et al. Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..
[9] Seyed A Shahrestani. Employing artificial immunology and approximate reasoning models for enhanced network intrusion detection , 2009 .
[10] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[11] Sahin Albayrak,et al. Intelligent Network-Based Early Warning Systems , 2006, CRITIS.
[12] N. John Castellan,et al. Individual and group decision making : current issues , 2013 .
[13] Peter Sewell,et al. Passive-attack analysis for connection-based anonymity systems , 2004, International Journal of Information Security.
[14] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[15] Michael E. Lesk,et al. The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.
[16] Ray Bert,et al. Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .
[17] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[18] Tony Guo,et al. Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach , 2012 .
[19] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.