메뉴 건너뛰기




Volumn , Issue , 2008, Pages 249-254

A composite network security assessment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTERNET; NETWORK SECURITY; NUCLEAR MATERIALS SAFEGUARDS; PROGRAM PROCESSORS; SECURITY OF DATA;

EID: 55349129266     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2008.59     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 34250178051 scopus 로고    scopus 로고
    • Laboratory exercises in online information assurance courses
    • Bhagyavati. Laboratory exercises in online information assurance courses. J. Educ. Resour. Comput., 6(4):4, 2006.
    • (2006) J. Educ. Resour. Comput , vol.6 , Issue.4 , pp. 4
    • Bhagyavati1
  • 3
    • 55349130138 scopus 로고    scopus 로고
    • BS7799:PD3002. Guide to bs7799 risk assessment and risk management pd3002, 2000
    • BS7799:PD3002. Guide to bs7799 risk assessment and risk management (pd3002), 2000.
  • 4
    • 55349114165 scopus 로고    scopus 로고
    • CC/ISO and CC/ISO-IS: 15408. Common criteria/iso is 15408, version 2.1, October 1999
    • CC/ISO and CC/ISO-IS: 15408. Common criteria/iso is 15408, version 2.1, October 1999.
  • 5
    • 55349121659 scopus 로고    scopus 로고
    • Using a simulation environment for teaching and researching networking topics
    • New York, NY, USA, ACM
    • V. Clincy. Using a simulation environment for teaching and researching networking topics. In ACM-SE43: Proceedings of the 43rd annual Southeast regional conference, pages 11-11, New York, NY, USA, 2005. ACM.
    • (2005) ACM-SE43: Proceedings of the 43rd annual Southeast regional conference , pp. 11-11
    • Clincy, V.1
  • 9
    • 15744366064 scopus 로고    scopus 로고
    • Iso/iec 17799:2000 code of practice for information security management,
    • ISO/IEC: 17799
    • ISO/IEC: 17799. Iso/iec 17799:2000 code of practice for information security management, 2000.
    • (2000)
  • 10
    • 33750940021 scopus 로고    scopus 로고
    • A remote IT security evaluation scheme: A proactive approach to risk management
    • Los Alamitos, CA, USA, IEEE Computer Society
    • S. Kondakci. A remote IT security evaluation scheme: A proactive approach to risk management. In IEEE Proceedings of IWIA, volume 1, pages 93-102, Los Alamitos, CA, USA, 2006. IEEE Computer Society.
    • (2006) IEEE Proceedings of IWIA , vol.1 , pp. 93-102
    • Kondakci, S.1
  • 11
    • 55349122357 scopus 로고    scopus 로고
    • A new assessment and improvement model of risk propagation in information security
    • S. Kondakci. A new assessment and improvement model of risk propagation in information security. Int. J. Information and Computer Security, 1(3):341-366, 2007.
    • (2007) Int. J. Information and Computer Security , vol.1 , Issue.3 , pp. 341-366
    • Kondakci, S.1
  • 12
    • 84893183746 scopus 로고    scopus 로고
    • Remote security evaluation agent for the RSEP protocol
    • Trafford Pub
    • S. Kondakci. Remote security evaluation agent for the RSEP protocol. In Int. Conf. on Security of Information and Networks, volume 1, pages 186-195. Trafford Pub., 2007.
    • (2007) Int. Conf. on Security of Information and Networks , vol.1 , pp. 186-195
    • Kondakci, S.1
  • 18
    • 35048893595 scopus 로고    scopus 로고
    • Results of classroom enterprise security assessment of five large enterprise networks
    • G. L. Wooley. Results of classroom enterprise security assessment of five large enterprise networks. J. Comput. Small Coll., 18(3):185-195, 2003.
    • (2003) J. Comput. Small Coll , vol.18 , Issue.3 , pp. 185-195
    • Wooley, G.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.