메뉴 건너뛰기




Volumn , Issue , 2009, Pages 566-571

Modeling misuse patterns

Author keywords

[No Author keywords available]

Indexed keywords

GENERIC SOLUTIONS; SECURITY DESIGN; SECURITY PATTERNS;

EID: 70349706065     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.139     Document Type: Conference Paper
Times cited : (41)

References (26)
  • 3
    • 70349700822 scopus 로고    scopus 로고
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, 1, Wiley, 1996.
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, Volume 1, Wiley, 1996.
  • 4
    • 84869630846 scopus 로고    scopus 로고
    • CERT Coordination Center. Carnegie Mellon University, http://www.cert.org/, 2006.
    • (2006)
  • 13
    • 70349721021 scopus 로고    scopus 로고
    • A.P. Moore, R.J. Ellison, and R.C. Linger, Attack modeling for information security and survability. Tech. Note CMU/SEI-2001-TN-001, 2001.
    • A.P. Moore, R.J. Ellison, and R.C. Linger, Attack modeling for information security and survability. Tech. Note CMU/SEI-2001-TN-001, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.