Prerequisites for creating resources and compositions for cyber defence
暂无分享,去创建一个
[1] Pascal Fradet,et al. Aspects of availability , 2007, GPCE '07.
[2] Beñat Bilbao-Osorio and Soumitra Dutta and Bruno Lanvin. Global Information Technology Report 2014. Rewards and Risks of Big Data , 2014 .
[3] F. C. P. Motta. The theory of communicative action , 1991 .
[4] John H. Holland,et al. Hidden Order: How Adaptation Builds Complexity , 1995 .
[5] J. Habermas,et al. The Theory of Communicative Action, Vol. 1, Reason and the Rationalization of Society , 1986 .
[6] P. Ball. Critical Mass: How One Thing Leads to Another , 2004 .
[7] L. Henderson. On the Social System , 1993 .
[8] S. Kauffman. At Home in the Universe: The Search for the Laws of Self-Organization and Complexity , 1995 .
[9] Social and Human Elements of Information Security: A Case Study , 2009 .
[10] J. T.,et al. Creative Evolution , 1911, Nature.
[11] Melissa Hathaway. Advanced Research Workshop Findings , 2014, Best Practices in Computer Network Defense.
[12] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[13] Tuija Kuusisto,et al. Information Security Culture as a Social System: Some Notes of Information Availability and Sharing , 2009 .
[14] Raymond P. Akin. Complexity Theory and Network Centric Warfare , 2009 .
[15] John R. Koza,et al. Hidden Order: How Adaptation Builds Complexity. , 1995, Artificial Life.
[16] J. Habermas,et al. The theory of communicative action. Volume 2, Lifeworld andsystem : a critique of functionalist reason , 1989 .