Toward Using Intelligent Agents to Detect, Assess, and Counter Cyberattacks in a Network-Centric Environment
暂无分享,去创建一个
[1] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[2] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[3] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Edward L. Waltz,et al. Information Warfare Principles and Operations , 1998 .
[6] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[7] F. Schneider. Trust in Cyberspace , 1998 .
[8] Howard E. Shrobe,et al. Computational vulnerability analysis for information survivability , 2002, AI Mag..
[9] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[10] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[11] Simson L. Garfinkel,et al. Practical UNIX Security , 1991 .
[12] Norman R Howes,et al. On Cyber Warfare Command and Control Systems , 2004 .
[13] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[14] Peter Williams,et al. Digital Certificates: Applied Internet Security , 1998 .
[15] Ian F. Alexander,et al. Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..