메뉴 건너뛰기




Volumn 1, Issue 2, 2003, Pages 72-76

The weakest link revisited

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; OPERATING SYSTEM SECURITY; SECURITY STRATEGIES; WORKSTATION SECURITY;

EID: 3042745793     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2003.1193216     Document Type: Review
Times cited : (50)

References (16)
  • 2
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • K. Thompson, "Reflections on Trusting Trust," Comm. ACM, vol. 27, no. 8, 1984, pp. 761-763.
    • (1984) Comm. ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 6
    • 0023294949 scopus 로고
    • Computer viruses, theory and experiments
    • F. Cohen, "Computer Viruses, Theory and Experiments," Computers & Security, vol. 6, no. 1, 1987, pp. 22-35.
    • (1987) Computers & Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 8
    • 84862376472 scopus 로고
    • Computer viruses: A global perspective
    • Virus Bulletin Ltd., Abingdon, England
    • S.R. White, J.O. Kephart, and D.M. Chess, "Computer Viruses: A Global Perspective," Proc. 5th Virus Bulletin Int'l Conf. (VB 95), Virus Bulletin Ltd., Abingdon, England, 1995; www.research.ibm.com/antivirus/ SciPapers/White/VB95/vb95.distrib.html.
    • (1995) Proc. 5th Virus Bulletin Int'l Conf. (VB 95)
    • White, S.R.1    Kephart, J.O.2    Chess, D.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.