Design and Implementation of a Research and Education Cybersecurity Operations Center
暂无分享,去创建一个
Alan G. Labouseur | Matthew A. Johnson | Casimer DeCusatis | Robert M. Cannistra | Robert Cannistra | Alan G. Labouseur | C. DeCusatis | Matthew A. Johnson
[1] Casimer DeCusatis,et al. Identity-based network security for commercial blockchain services , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[2] Mark M. Payne. Destruction and Creation , 2010 .
[3] Alan G. Labouseur,et al. An API honeypot for DDoS and XSS analysis , 2017, 2017 IEEE MIT Undergraduate Research Technology Conference (URTC).
[4] Casimer DeCusatis,et al. Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).
[5] Casimer DeCusatis,et al. Methodology for an Open Digital Forensics Model Based on CAINE , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[6] Alan Labouseur. G* studio , 2016, Inroads.
[7] Alan G. Labouseur,et al. The G* graph database: efficiently managing large distributed dynamic graphs , 2015, Distributed and Parallel Databases.