메뉴 건너뛰기




Volumn , Issue , 2011, Pages 914-917

System-aware cyber security

Author keywords

Adaptive Security; Application Layer Security; Configuration Hopping; Data Continuity; Honeypot; Security Aware

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SOFTWARE REUSABILITY; NETWORK SECURITY;

EID: 80051530371     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2011.158     Document Type: Conference Paper
Times cited : (12)

References (13)
  • 1
    • 85080693900 scopus 로고    scopus 로고
    • Reflections on cyber security
    • W. A. Wulf and A. K. Jones, "Reflections on cyber security," Science Magazine, vol. 326, 2009.
    • (2009) Science Magazine , vol.326
    • Wulf, W.A.1    Jones, A.K.2
  • 5
    • 85080758370 scopus 로고    scopus 로고
    • U. C. General, Report to the chairman committe on government operations, House of Representatives of the United States, May 1981
    • U. C. General, Report to the chairman committe on government operations, House of Representatives of the United States, May 1981.
  • 7
    • 85080732464 scopus 로고    scopus 로고
    • The Under Secretary of Defense for Acquisition Technology and Logistics, The Assistance Secretary of Defense for Networks and Information Integration, and DoD Chief Information Officer
    • The Under Secretary of Defense for Acquisition Technology and Logistics, The Assistance Secretary of Defense for Networks and Information Integration, and DoD Chief Information Officer, "Report on trusted defense systems," 2009.
    • (2009) Report on Trusted Defense Systems
  • 8
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and David, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    David3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.