Applying public health strategies to the protection of cyberspace
暂无分享,去创建一个
Mason Rice | Sujeet Shenoi | Robert Miller | Jonathan Butts | Mason Rice | S. Shenoi | J. Butts | Robert A. Miller
[1] Claudia M. Smith,et al. Community Health Nursing: Theory and Practice , 1995 .
[2] George Kurtz,et al. Hacking Exposed , 2005 .
[3] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[4] Gretchen A. Condran,et al. Public health measures and mortality in U.S. cities in the late nineteenth century , 1978 .
[5] Peter Weiss,et al. Network inoculation : Antivirus shield would outrace cyber infections , 2005 .
[6] F. Schneider. Trust in Cyberspace , 1998 .
[7] A Sawai,et al. [Changes in life expectancy]. , 1973, Kangogaku zasshi.
[8] Patrick D. McDaniel,et al. Enterprise Security: A Community of Interest Based Approach , 2006, NDSS.
[9] Alisa Mizikar,et al. Flu.gov2010177Flu.gov. Washington, DC: US Department of Health and Human Services Last visited December 2009. URL: www.flu.gov Gratis , 2010 .
[10] Kwang-Sun Lee,et al. Infant Mortality Decline in the Late 19th and Early 20th Centuries: the role of market milk , 2007, Perspectives in biology and medicine.
[11] Abhinav Rastogi,et al. Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..
[12] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[13] Deborah A. Frincke,et al. Information Assurance Education: A Work In Progress , 2008, IEEE Security & Privacy.
[14] Daniel M. Gerstein. Securing America's Future: National Strategy in the Information Age , 2005 .