Moving Toward Trustworthy Systems: R&D Essentials
暂无分享,去创建一个
[1] Van-Hau Pham,et al. The WOMBAT Attack Attribution Method: Some Results , 2009, ICISS.
[2] N. Kshetri. The Global Cybercrime Industry , 2010 .
[3] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[4] Michael Näf. UBIQUITOUS INSECURITY? HOW TO "HACK" IT SYSTEMS , 2001 .
[5] Edward D. Lazowska,et al. Cyber Security: A Crisis of Prioritization , 2005 .
[6] Ruby B. Lee,et al. National Cyber Leap Year Summit 2009 Co-Chairs ’ Report , 2009 .
[7] Anna Cinzia Squicciarini,et al. Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor , 2011, IEEE Security & Privacy.
[8] Ali Mili,et al. Managing complex IT security processes with value based measures , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[9] L. M. Hively,et al. A Vision for Scalable Trustworthy Computing , 2010 .