Replication Does Survive Information Warfare Attacks
暂无分享,去创建一个
[1] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[2] J. Froscher,et al. Practical Defenses Against Storage Jamming , 1997 .
[3] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[4] John P. McDermott,et al. Storage Jamming , 1995, DBSec.
[5] John McDermott. A Technique for Removing an Important Class of Trojan Horses from High-Order Languages , 1988 .
[6] Ravi S. Sandhu,et al. Separation of Duties in Computerized Information Systems , 1990, DBSec.