-
5
-
-
33645411999
-
Dynamic programming and optimal control
-
2nd ed. Belmont, MA
-
D. Bertsekas. Dynamic programming and optimal control. 2nd ed. Belmont, MA: Athena Scientific, vol. 2., 2001.
-
(2001)
Athena Scientific
, vol.2
-
-
Bertsekas, D.1
-
7
-
-
38349000956
-
A logical framework for evaluating network resilience against faults and attacks
-
E. Bursztein and J. Goubalt-Larrecq. A logical framework for evaluating network resilience against faults and attacks. Lecture Notes in Computer Science; Vol. 4846, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4846
-
-
Bursztein, E.1
Goubalt-Larrecq, J.2
-
9
-
-
77951733671
-
Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology
-
L. Carin, G. Cybenko, and J. Hughes. Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer, 2008.
-
(2008)
IEEE Computer
-
-
Carin, L.1
Cybenko, G.2
Hughes, J.3
-
10
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
November
-
A. Chakrabarti and G. Manimaran. Internet infrastructure security: A taxonomy. IEEE Network, 16:13, November 2002.
-
(2002)
IEEE Network
, vol.16
, pp. 13
-
-
Chakrabarti, A.1
Manimaran, G.2
-
12
-
-
33645766952
-
-
President's Information Technology Advisory Committee
-
President's Information Technology Advisory Committee, Cyber Security: A crisis of prioritization, 2005.
-
(2005)
Cyber Security: A Crisis of Prioritization
-
-
-
15
-
-
77951722742
-
-
The Trusted Computing Group, http://www.trustedcomputinggroup.org.
-
-
-
-
18
-
-
15744370034
-
A taxonomy of network and computer attacks
-
February
-
S. Hansman and R. Hunt. A taxonomy of network and computer attacks. Computers and Security, 24:31-43, February 2005.
-
(2005)
Computers and Security
, vol.24
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
21
-
-
33750374206
-
A taxonomy and comparison of computer security incidents from the commercial and government sectors
-
October
-
M. Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors. Computers and Security, 25:522-538, October 2005.
-
(2005)
Computers and Security
, vol.25
, pp. 522-538
-
-
Kjaerland, M.1
-
23
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
P. Liu, W. Zang, and M. Yu. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security (TISSEC), 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
27
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. Computer Communication Review 34, no. 2, 2004.
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
-
-
Mirkovic, J.1
Reiher, P.2
-
29
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy no.4, 2003.
-
(2003)
IEEE Security and Privacy
, vol.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
33
-
-
77951715218
-
-
U.S. Department of Homeland Security
-
U.S. Department of Homeland Security, https://buildsecurityin.us-cert. gov/daisy/bsi/home.html.
-
-
-
-
35
-
-
77951713289
-
-
Packet storm vulnerability database, http:// packetstormsecurity.org/, 2009.
-
(2009)
-
-
|