Proposed methodology to enhance C4I systems security on architectural level
暂无分享,去创建一个
[1] Abdullah Sharaf Alghamdi,et al. Application of artificial neural network in detection of DOS attacks , 2009, SIN '09.
[2] Fei Hu,et al. Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.
[3] Stephen Blanchette. Assurance Cases for Design Analysis of Complex System of Systems Software , 2009 .
[4] Veselin Tselkov,et al. Information Assurance in C4I Systems , 2000 .
[5] Tim Kelly,et al. The Goal Structuring Notation – A Safety Argument Notation , 2004 .
[6] Denis Trcek,et al. Security policy conceptual modeling and formalization for networked information systems , 2000, Comput. Commun..
[7] Paul G. Kaminski. The Defense Acquisition System - A New Direction; A New Emphasis , 1996 .
[8] Michael Kass,et al. Software Assurance Using Structured Assurance Case Models , 2010, Journal of research of the National Institute of Standards and Technology.
[9] Paul Clements,et al. Systems and Software Product Line Engineering , 2013 .
[10] Bignolas Mira da Silva,et al. Enterprise Architecture , 2007 .
[11] Bill Hancock,et al. Information Warfare Highlighted as a Concern by US Government , 2001, Comput. Secur..
[12] Scott Renner. Building Information Systems for Network -Centric Warfare , 2003 .
[13] Abdullah Sharaf Alghamdi,et al. Enhancing C4I Security Using Threat Modeling , 2010, 2010 12th International Conference on Computer Modelling and Simulation.
[14] R. William Maule. Enterprise knowledge security architecture for military experimentation , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.