Combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity
暂无分享,去创建一个
[1] Ed Dawson,et al. Modelling Trust Structures for Public Key Infrastructures , 2002, ACISP.
[2] Craig Smith,et al. Know Your Enemy : Passive Fingerprinting , 2001 .
[3] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[4] Edward M. Roche,et al. Critical Foundations: Protecting America's Infrastructures , 1998 .
[5] Ross Anderson,et al. The Global Internet Trust Register , 1999 .
[6] Edward L. Waltz,et al. Information Warfare Principles and Operations , 1998 .
[7] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[8] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[9] B. Gladman,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .