메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3-15

Toward models for forensic analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS; DATA REDUCTION; DATA STRUCTURES; REAL TIME CONTROL;

EID: 34548135293     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SADFE.2007.23     Document Type: Conference Paper
Times cited : (25)

References (24)
  • 4
    • 34548109163 scopus 로고    scopus 로고
    • Technical Report CSE-2006-20, University of California at Davis
    • Matt Bishop and Sean Peisert. Your Security Policy is What. Technical Report CSE-2006-20, University of California at Davis, 2006.
    • (2006) Your Security Policy is What
    • Bishop, M.1    Peisert, S.2
  • 9
    • 0345302827 scopus 로고    scopus 로고
    • PhD thesis, University of California, San Diego, Department of Electrical and Computer Engineering
    • Andrew H. Gross. Analyzing Computer Intrusions. PhD thesis, University of California, San Diego, Department of Electrical and Computer Engineering, 1997.
    • (1997) Analyzing Computer Intrusions
    • Gross, A.H.1
  • 16
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees: Modeling Security Threats
    • December
    • Bruce Schneier. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, 24(12):21-29, December 1999.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.