Applying a model of configuration complexity to measure security impact on IT procedures
暂无分享,去创建一个
[1] Yixin Diao,et al. Quantifying the Complexity of IT Service Management Processes , 2006, DSOM.
[2] Keum-Suk Lee,et al. A mobile agent security management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[3] G. A. Miller. THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .
[4] Joseph L. Hellerstein,et al. An approach to benchmarking configuration complexity , 2004, EW 11.
[5] Joseph L. Hellerstein,et al. A model of configuration complexity and its application to a change management system , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[6] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[7] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[8] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .
[9] Joseph L. Hellerstein,et al. A configuration complexity model and its application to a change management system , 2007, IEEE Transactions on Network and Service Management.
[10] Yixin Diao,et al. Predicting Labor Cost through IT Management Complexity Metrics , 2007, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management.