메뉴 건너뛰기




Volumn 13, Issue 4, 2008, Pages 235-246

An extensible analysable system model

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY;

EID: 57649097309     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.10.012     Document Type: Article
Times cited : (37)

References (11)
  • 3
    • 38149079272 scopus 로고    scopus 로고
    • Brackney R.C., and Anderson R.H. (Eds), RAND Corporation, Santa Monica, CA, U.S.A.
    • In: Brackney R.C., and Anderson R.H. (Eds). Understanding the insider threat (2005), RAND Corporation, Santa Monica, CA, U.S.A.
    • (2005) Understanding the insider threat
  • 5
    • 57649109155 scopus 로고    scopus 로고
    • Gunnarsson D. Static analysis of the insider problem, Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby, supervised by Christian W. Probst, IMM, DTU; 2007.
    • Gunnarsson D. Static analysis of the insider problem, Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby, supervised by Christian W. Probst, IMM, DTU; 2007.
  • 10
    • 57649104389 scopus 로고    scopus 로고
    • Probst CW, Hansen RR, Nielson F. Where can an insider attack?. In: Workshop on formal aspects in security and trust (FAST 2006); 2006.
    • Probst CW, Hansen RR, Nielson F. Where can an insider attack?. In: Workshop on formal aspects in security and trust (FAST 2006); 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.