메뉴 건너뛰기




Volumn 237, Issue , 2007, Pages 141-148

How to design computer security experiments

Author keywords

[No Author keywords available]

Indexed keywords

EXPERIMENTS; SECURITY SYSTEMS;

EID: 35649020213     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-73269-5_19     Document Type: Conference Paper
Times cited : (35)

References (10)
  • 3
    • 35648963296 scopus 로고
    • The Unsuccessful Experiment
    • Henry Herringman, London
    • Robert Boyle. The Unsuccessful Experiment. In Certain Physiological Essays. Henry Herringman, London, 1661.
    • (1661) Certain Physiological Essays
    • Boyle, R.1
  • 6
    • 35648955277 scopus 로고    scopus 로고
    • James Lind. A Treatise of the Scurvy. Sands, Murray, and Cochran for A Kincaid and A Donaldson, 1753.
    • James Lind. A Treatise of the Scurvy. Sands, Murray, and Cochran for A Kincaid and A Donaldson, 1753.
  • 9
    • 1642516070 scopus 로고    scopus 로고
    • The Honeynet Project: Trapping the Hackers
    • Mar-Apr
    • Lance Spitzner. The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy, l(2):15-23, Mar-Apr 2003.
    • (2003) IEEE Security & Privacy , vol.50 , Issue.2 , pp. 15-23
    • Spitzner, L.1
  • 10
    • 35648994501 scopus 로고    scopus 로고
    • The Free Encyclopedia Wikipedia. Scientific method. http://en.wikipedia.org/w/index.php?title=Scientific_method&oldid= 104300855, January 30 09:59 UTC 2007.
    • The Free Encyclopedia Wikipedia. Scientific method. http://en.wikipedia.org/w/index.php?title=Scientific_method&oldid= 104300855, January 30 09:59 UTC 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.