Nonlinear Resource Allocation in Restoration of Compromised Systems
暂无分享,去创建一个
[1] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[2] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[3] Jaynarayan H. Lala,et al. Foundations of Intrusion Tolerant Systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[4] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[5] W. Baumol,et al. Economics--principles and policy , 1979 .
[6] Michael Grüninger,et al. Introduction , 2002, CACM.
[7] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[8] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.