A Distributed Honeypot System for Grid Security
暂无分享,去创建一个
[1] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[2] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[3] Fausto Giunchiglia,et al. Modeling Early Requirements in Tropos: A Transformation Based Approach , 2001, AOSE.
[4] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[5] Eric S. K. Yu,et al. Towards modelling and reasoning support for early-phase requirements engineering , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.
[6] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[7] Stephen Fickas,et al. Goal-Directed Requirements Acquisition , 1993, Sci. Comput. Program..
[8] Geng Yang,et al. Honeypots in blackhat mode and its implications [computer security] , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[9] Martin S. Feather,et al. A quantitative risk model for early lifecycle decision making , 2002 .