Adaptive Knowledge Encoding for Agile Cybersecurity Operations
暂无分享,去创建一个
[1] James D. Lowe. A Design Pattern Language for Space Stations and Long- Term Residence Human Spacecraft , 2006 .
[2] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[3] R. Ackoff. From Data to Wisdom , 2014 .
[4] Rick Dove,et al. Pattern qualifications and examples of next-generation agile system-security strategies , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[5] Youki Kadobayashi,et al. Ontological approach toward cybersecurity in cloud computing , 2010, SIN.
[6] Jennifer E. Rowley,et al. The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..
[7] Michael Hughes,et al. A pattern language approach to usability knowledge management , 2006 .
[8] Werner Ulrich,et al. The Art of Observation: Understanding Pattern Languages , 2006 .
[9] Rick Dove,et al. 8.4.1 Fundamentals of Agile Systems Engineering – Part 1 , 2014 .
[10] Ralph Johnson,et al. Security Patterns and their Classification Schemes , 2006 .
[11] Olivier L. de Weck,et al. 10.1.3 Agile SYSTEMS ENGINEERING versus AGILE SYSTEMS engineering , 2005 .
[12] Jay Liebowitz. Knowledge management - learning from knowledge engineering , 2001 .
[13] F. Osinga. Science, Strategy and War: The Strategic Theory of John Boyd , 2006 .
[14] Gerard G. Meszaros,et al. A pattern language for pattern writing , 1997 .
[15] Bonnie Lee Appleton. Patterns and Software: Essential Concepts and Terminology , 1997 .
[16] Murray Silverstein,et al. A Pattern Language , 1977 .
[17] John Boardman,et al. Systems Thinking: Coping with 21st Century Problems , 2008 .
[18] Pauline Ratnasingam,et al. A knowledge architecture for IT security , 2007, CACM.
[19] Keith Willett. Information Assurance Architecture , 2008 .
[20] Gary B. Reid,et al. A Comparative Evaluation of Two Subjective Workload Measures: The Subjective Workload Assessment Technique and the Modified Cooper Harper Scale. , 1986 .