ALMA MATER STUDIORUM - UNIVERSITÀ DI BOLOGNA CAMPUS DI CESENA SCUOLA DI INGEGNERIA ED ARCHITETTURA CORSO DI LAUREA MAGISTRALE IN INGEGNERIA INFORMATICA ICT Security: defence strategies against targeted attacks
暂无分享,去创建一个
[1] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[2] Kevin Mandia,et al. Incident Response & Computer Forensics, 2nd Ed. , 2003 .
[3] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[4] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[5] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[6] Billy Rios,et al. Hacking: The Next Generation , 2009 .
[7] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[8] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Kevin Mandia,et al. Incident Response & Computer Forensics , 2003 .
[10] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[11] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[12] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[13] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[14] Johnny S. Wong,et al. A taxonomy of intrusion response systems , 2007, Int. J. Inf. Comput. Secur..
[15] Marco Ramilli,et al. Multi-stage delivery of malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[16] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[17] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.