메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Making security measurable and manageable

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL ISSUES; EXCHANGE FORMATS;

EID: 78650759690     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2008.4753203     Document Type: Conference Paper
Times cited : (41)

References (14)
  • 1
    • 21244477111 scopus 로고    scopus 로고
    • Transformational Vulnerability Management Through Standards
    • May, 2005
    • Martin, R. A., "Transformational Vulnerability Management Through Standards", CrossTalk: The Journal of Defense Software Engineering, May, 2005, (www.stsc.hill.af.mil/crosstalk/2005/05/0505Martin.html)
    • CrossTalk: The Journal of Defense Software Engineering
    • Martin, R.A.1
  • 6
    • 62349129067 scopus 로고    scopus 로고
    • The Federal Desktop Core Configuration (FDCC) Effort, National Institute of Standards and Technology, (nvd.nist.gov/fdcc/index.cfm)
    • "The Federal Desktop Core Configuration (FDCC) Effort", National Institute of Standards and Technology, (nvd.nist.gov/fdcc/index.cfm)
  • 12
    • 84869255049 scopus 로고    scopus 로고
    • Asset Configuration Compliance Module
    • DISA, Aug. 5, 2008
    • DISA "Asset Configuration Compliance Module" RFI, Solicitation Number ACCMRFI, (www.fbo.gov), Aug. 5, 2008.
    • RFI, Solicitation Number ACCMRFI


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.