Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing
暂无分享,去创建一个
[1] I. Monitor. Information Security Management Handbook , 2000 .
[2] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[3] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[4] Udo W. Pooch,et al. Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.
[5] Anne Gates Applin,et al. Second language acquisition and CS1 , 2001, SIGCSE '01.
[6] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[7] Isij Monitor,et al. Network Intrusion Detection: An Analyst’s Handbook , 2000 .
[8] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[9] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..