Augmented Risk Analysis
暂无分享,去创建一个
[1] Stefano Bistarelli,et al. Retaliation: Can We Live with Flaws? , 2005 .
[2] Alexander K. Petrenko,et al. Electronic Notes in Theoretical Computer Science , 2009 .
[3] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[4] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[5] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[6] Wes Sonnenreich,et al. Return On Security Investment (ROSI) - A Practical Quantitative Modell , 2005, J. Res. Pract. Inf. Technol..
[7] Ronald L. Krutz,et al. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security , 2001 .
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[10] Stefano Bistarelli,et al. Soft Constraint Programming to Analysing Security Protocols , 2004, Theory Pract. Log. Program..
[11] Stefano Bistarelli,et al. A Protocol's Life After Attacks , 2003, Security Protocols Workshop.
[12] Harold F. Tipton,et al. Handbook of Information Security Management , 1997 .