Securing information infrastructure from information warfare
暂无分享,去创建一个
[1] Andy Clarke,et al. The Software Colander Holes in Messagin , 2000, Comput. Secur..
[2] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[3] Carla Marceau,et al. Intrusion detection for distributed applications , 1999, CACM.
[4] Blaise Cronin,et al. Raising the intelligence stakes: Corporate information warfare and strategic surprise , 1999 .
[5] B. Berkowitz. War Logs On: Girding America for Computer Combat , 2000 .
[6] Neil Munro. Inforwar: AK-47s, Lies, and Videotape. , 1999 .
[7] Terrance Goan. A cop on the beat: collecting and appraising intrusion evidence , 1999, CACM.
[8] Neil Munro. From Washington: Infowar: AK-47s, lies, and videotape , 1999, CACM.
[9] Chris I. Dalton,et al. An operating system approach to securing e-services , 2001, CACM.
[10] Dorothy E. Denning,et al. Information Warfare And Security , 1998 .
[11] Brajendra Panda,et al. Defensive information warfare , 1999, CACM.
[12] J. Kumagai. The Web as weapon [cyber warfare] , 2001 .