IT Security Research and Education in Synergy
暂无分享,去创建一个
[1] T. Olovsson,et al. On measurement of operational security , 1994, IEEE Aerospace and Electronic Systems Magazine.
[2] Tomas Olovsson,et al. On the modelling of preventive security based on a PC network intrusion experiment , 1996, ACISP.
[3] Tomas Olovsson,et al. Towards operational measures of computer security: Experimentation and modelling , 1995 .
[4] Tomas Olovsson,et al. An empirical model of the security intrusion process , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.
[5] Erland Jonsson,et al. A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT , 1997 .
[6] Deborah A. Frincke,et al. Integrating Security into the Curriculum , 1998, Computer.
[7] Erland Jonsson,et al. A taxonomy and overview of information security experiments , 1997, SEC.
[8] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .
[9] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..
[10] Erland Jonsson,et al. An Analysis of the Security of Windows NT , 1998 .
[11] Peter D. Goldis. Questions and Answers about Tiger Teams , 1989 .
[12] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[13] Tomas Olovsson,et al. An analysis of a secure system based on trusted components , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.
[14] I. S. Herschberg. Make the tigers hunt for you , 1988, Comput. Secur..
[15] Tomas Olovsson,et al. Security Evaluation of a PC Network based on Intrusion Experiments , 1996, CCS 1996.
[16] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[17] Erland Jonsson,et al. A Map of Security Risks Associated wuth Using COTS , 1998, Computer.
[18] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[19] Georgory White,et al. Security across the curriculum: using computer secu-rity to teach computer science principles , 1997 .
[20] Eugene H. Spafford,et al. Are computer hacker break-ins ethical? , 1992, J. Syst. Softw..
[21] Cynthia E. Irvine,et al. THE NPS CISR GRADUATE PROGRAM IN INFOSEC: SIX YEARS OF EXPERIENCE , 1997 .