Operational Levels of Cyber Intelligence
暂无分享,去创建一个
Randy Borum | R. Borum | J. Felker | T. Mattern | G. Bamford | Troy Mattern | John Felker | George Bamford
[1] Richard D. Graubart,et al. Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels , 2010, 2010 IEEE Second International Conference on Social Computing.
[2] Derek S. Reveron,et al. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World , 2012 .
[3] Ramon Casadesus-Masanell,et al. From Strategy to Business Models and onto Tactics , 2010 .
[4] Patrick Brézillon,et al. Framing decision making at two levels , 2010, DSS.
[5] Klaus Julisch. Understanding and overcoming cyber security anti-patterns , 2013, Comput. Networks.
[6] Sherali Zeadally,et al. Securing Cyberspace in the 21st Century , 2013, Computer.
[7] Jay McAllister,et al. SEI Innovation Center Report: Cyber Intelligence Tradecraft Project: Summary of Key Findings , 2013 .
[8] Frédéric Adam,et al. Proceedings of the 2010 conference on Bridging the Socio-technical Gap in Decision Support Systems: Challenges for the Next Decade , 2010 .
[9] B Vossekuil,et al. Threat assessment: defining an approach for evaluating risk of targeted violence. , 1999, Behavioral sciences & the law.
[10] E. Malone,et al. The “wicked problem” of cybersecurity policy: analysis of United States and Canadian policy response , 2013 .
[11] Song Chen,et al. Human perspective to anomaly detection for cybersecurity , 2013, Journal of Intelligent Information Systems.
[12] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[13] Randy Borum,et al. Thr eat assessment: Definin g an approach to assessing risk for targeted violence , 1999 .
[14] Si Li,et al. Risk-Based Models of Attacker Behavior in Cybersecurity , 2013, SBP.
[15] Daojing He,et al. How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway? , 2014, IEEE Intelligent Systems.
[17] Nasir D. Memon,et al. Winning Cybersecurity One Challenge at a Time , 2012, IEEE Security & Privacy.
[18] Newton Lee. Cyber Attacks, Prevention, and Countermeasures , 2015 .
[19] So Jeong Kim,et al. Study on the Development of Early Warning Model for Cyber Attack , 2011, 2011 International Conference on Information Science and Applications.