Using Nature to Best Clarify Computer Security and Threats
暂无分享,去创建一个
[1] Jacob Goldenberg,et al. Distributive immunization of networks against viruses using the ‘honey-pot’ architecture , 2005 .
[2] S. Sitkin,et al. Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity , 1995 .
[3] Peter R. Dickson,et al. How Believing in Ourselves Increases Risk Taking: Perceived Self‐Efficacy and Opportunity Recognition , 1994 .
[4] Sunil Hazari. Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study , 2005, J. Organ. End User Comput..
[5] Paul Baybutt. AN ASSET-BASED APPROACH FOR INDUSTRIAL CYBER SECURITY VULNERABILITY ANALYSIS , 2003 .
[6] Allen Kent,et al. The Froehlich/Kent encyclopedia of telecommunications , 1991 .
[7] George S. Oreku,et al. Improved Feistel-based ciphers for wireless sensor network security , 2008 .
[8] B Busby. Security on the Internet. , 1997, Health physics.
[9] Shampa Paul. A case study of E-governance initiatives in India , 2007 .
[10] Adrian Perrig,et al. Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration , 2006, INTR.