A case for protocol dependency
暂无分享,去创建一个
[1] Edward M. Roche,et al. Critical Foundations: Protecting America's Infrastructures , 1998 .
[2] J. Röning,et al. The Vulnerability Process: A Tiger Team Approach to Resolving Vulnerability Cases , 1999 .
[3] S. M. Rinaldi,et al. Identifying, Understanding, and Analyzing , 2001 .
[4] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[6] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[7] Walter E. Beyeler,et al. Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems , 2004, Int. J. Crit. Infrastructures.
[8] Adrian V. Gheorghe,et al. Complexity induced vulnerability , 2004, Int. J. Crit. Infrastructures.
[9] Andrew Koubatis,et al. Risk management of complex critical systems , 2005, Int. J. Crit. Infrastructures.
[10] Ralf Mock,et al. Risk analysis of information systems by event process chains , 2005, Int. J. Crit. Infrastructures.