Network security supported by arguments
暂无分享,去创建一个
[1] Claudette Cayrol,et al. On the Acceptability of Arguments in Preference-based Argumentation , 1998, UAI.
[2] Shawn A. Butler. Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.
[3] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .
[4] Carol Woody,et al. Introduction to the OCTAVE ® Approach , 2003 .
[5] Stefano Bistarelli,et al. A First Comparison of Abstract Argumentation Reasoning-Tools , 2014, ECAI.
[6] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[7] Guido Boella,et al. Argumentation for Access Control , 2005, AI*IA.
[8] Simon Parsons,et al. Arguing About Firewall Policy , 2012, COMMA.
[9] Phan Minh Dung,et al. On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and n-Person Games , 1995, Artif. Intell..
[10] Trevor J. M. Bench-Capon,et al. Argumentation in artificial intelligence , 2007, Artif. Intell..
[11] Stefano Bistarelli,et al. Benchmarking Hard Problems in Random Abstract AFs: The Stable Semantics , 2014, COMMA.
[12] Elizabeth Sklar,et al. Argumentation logic to assist in security administration , 2012, NSPW '12.
[13] Francesco Santini,et al. Debating Cybersecurity or Securing a Debate? - (Position Paper) , 2014, FPS.
[14] Alessandra Russo,et al. Using argumentation logic for firewall configuration management , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[15] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[16] Stefano Bistarelli,et al. Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic , 2014, CLIMA.
[17] Tarek Bouyahia,et al. Metric for Security Activities Assisted by Argumentative Logic , 2014, DPM/SETOP/QASA.
[18] Ibrahim Sogukpinar,et al. ISRAM: information security risk analysis method , 2005, Comput. Secur..
[19] Alessandra Russo,et al. Using Argumentation Logic for Firewall Policy Specification and Analysis , 2006, DSOM.