-
1
-
-
55249110708
-
-
Publish House of Electronics Industry, Beijing, China
-
Yingmei Wang, Shengkai Wang, Guoshun Chen, and Xiangyun Cheng, Information Security Risk Assessment, Publish House of Electronics Industry, Beijing, China, 2007.
-
(2007)
Information Security Risk Assessment
-
-
Wang, Y.1
Wang, S.2
Chen, G.3
Cheng, X.4
-
3
-
-
0042170255
-
Vulnerability assessment tools
-
July
-
Wales E., "Vulnerability assessment tools". Network Security. Vol 2003, Issue 7, pp. 15-17, July, 2003.
-
(2003)
Network Security
, vol.2003
, Issue.7
, pp. 15-17
-
-
Wales, E.1
-
4
-
-
33745170386
-
Quantitative Hierarchical Threat Evaluation Model for Network Security
-
April
-
CHEN Xiu-Zhen, ZHENG Qing-Hua, GUAN Xiao-Hong, LIN Chen-Guang, "Quantitative Hierarchical Threat Evaluation Model for Network Security", Journal of Software, Vol. 17, No. 4, April 2006, pp. 885-897
-
(2006)
Journal of Software
, vol.17
, Issue.4
, pp. 885-897
-
-
CHEN, X.-Z.1
ZHENG, Q.-H.2
GUAN, X.-H.3
Chen-Guang, L.I.N.4
-
5
-
-
61849136266
-
-
Ph.d, Norwegian University of Science and Technology, Trondheim, June
-
Karin Sallhammar, "Stochastic Models for Combined Security and Dependability Evaluation" [Ph.d], Norwegian University of Science and Technology, Trondheim, June 2007, pp 13-14
-
(2007)
Stochastic Models for Combined Security and Dependability Evaluation
, pp. 13-14
-
-
Sallhammar, K.1
-
6
-
-
62349095510
-
-
Douglas J. Landoll, THE SECURITY RISK ASSESSMENT HANDBOOK:A Complete Guide for Performing Security Risk Assessments, Published in 2006 by Auerbach Publications Taylor & Francis Group
-
Douglas J. Landoll, THE SECURITY RISK ASSESSMENT HANDBOOK:A Complete Guide for Performing Security Risk Assessments, Published in 2006 by Auerbach Publications Taylor & Francis Group
-
-
-
-
7
-
-
1842829828
-
Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology
-
July
-
Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", National Institute of Standards and Technology, Special Publication 800-30, July 2002.
-
(2002)
Special Publication
, vol.800 -30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
8
-
-
61849140150
-
-
Master, National University of Defense Technology, Changsha, Hunan, China, Nov
-
Hua Liu, "The Research and Application of the Risk Assessment Technology" [Master], National University of Defense Technology, Changsha, Hunan, China, Nov. 2005.
-
(2005)
The Research and Application of the Risk Assessment Technology
-
-
Liu, H.1
-
9
-
-
0036083264
-
-
DeTreville, J., Binder, a logic-based security language, Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, no., pp. 105-113, 2002
-
DeTreville, J., "Binder, a logic-based security language," Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, vol., no., pp. 105-113, 2002
-
-
-
-
10
-
-
62349113056
-
-
Konstantinos Sagonas, Terrance Swift, David S. Warren, et al. The XSB System Manual:version 3.0 [EB/OL]. http://xsb.sourceforge.net. 2006.7.
-
Konstantinos Sagonas, Terrance Swift, David S. Warren, et al. "The XSB System Manual:version 3.0" [EB/OL]. http://xsb.sourceforge.net. 2006.7.
-
-
-
-
12
-
-
48349108542
-
A game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy
-
Wei Jiang, Hong-li Zhang, Zhi-hong Tian, Xin-fang Song, "A game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy", 2007 International Conference on Computational Intelligence and Security, 2007
-
(2007)
2007 International Conference on Computational Intelligence and Security
-
-
Jiang, W.1
Zhang, H.-L.2
Tian, Z.-H.3
Song, X.-F.4
-
13
-
-
0003427725
-
-
The MIT Press, Cambridge
-
M J Osborne, A Rubinstein, R Aumann, et al, A Course in Game Theory, 2nd ed [M], The MIT Press, Cambridge, 1994
-
(1994)
A Course in Game Theory, 2nd ed [M]
-
-
Osborne, M.J.1
Rubinstein, A.2
Aumann, R.3
|