A Quick Perspective on the Current State in Cybersecurity
暂无分享,去创建一个
[1] Richard J. Enbody,et al. Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.
[2] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[3] Herbert Bos,et al. SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[5] Helge Janicke,et al. Cyber warfare: Issues and challenges , 2015, Comput. Secur..
[6] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[7] Mat Honan. 29. How Apple and Amazon Security Flaws Led to My Epic Hacking , 2013 .
[8] Steve Mansfield-Devine. Security review: the past year , 2013 .
[9] Sean Watts. The notion of combatancy in cyber warfare , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[10] Edward Amoroso. From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud , 2013, IEEE Security & Privacy.
[11] Mariarosaria Taddeo,et al. An analysis for a just cyber warfare , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).