Security Concerns Towards Security Operations Centers
暂无分享,去创建一个
[1] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .
[2] Filip Jovanovic,et al. Risk Management Impact Assessment on the Success of Strategic Investment Projects : Benchmarking Among Different Sector Companies , 2016 .
[3] Kim-Kwang Raymond Choo,et al. A survey of information security incident handling in the cloud , 2015, Comput. Secur..
[4] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[5] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[6] Shu Yun Lim,et al. Security Issues and Future Challenges of Cloud Service Authentication , 2017 .
[7] David Nathans,et al. Designing and Building a Security Operations Center , 2014 .
[8] Apostolos P. Fournaris,et al. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks , 2017 .
[9] Barry Irwin,et al. Classification of Security Operation Centers , 2013, 2013 Information Security for South Africa.
[10] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Sven Ove Hansson,et al. Ethical Criteria of Risk Acceptance , 2003 .
[12] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[13] Danuta Zakrzewska,et al. Fuzzy Logic Based Modeling for Building Contextual Student Group Recommendations , 2015, ICCCI.
[14] Péter Vörös,et al. Big Data Testbed for Network Attack Detection , 2016 .
[15] Farinaz Koushanfar,et al. A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.
[16] Christopher Jesse,et al. Security Operation Center Concepts & Implementation , 2002 .
[17] M. Breitner,et al. Information security awareness and behavior: a theory-based literature review , 2014 .
[18] Prasad Calyam,et al. Intelligent Dashboard for augmented reality based incident command response co-ordination , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[19] Baruch Fischhoff,et al. The realities of risk-cost-benefit analysis , 2015, Science.