-
1
-
-
85080693900
-
Reflections on cyber security
-
W. A. Wulf and A. K. Jones, "Reflections on cyber security," Science Magazine, vol. 326, 2009.
-
(2009)
Science Magazine
, vol.326
-
-
Wulf, W.A.1
Jones, A.K.2
-
3
-
-
80051512428
-
-
BBN Technologies, Cambridge, MA, Tech. Rep. ADA415561, May
-
F. Webber, P. P. Pal, M. Atighetchi, C. Jones, and P. Rubel, "Applications that participate in their own defense (APOD)," BBN Technologies, Cambridge, MA, Tech. Rep. ADA415561, May 2003.
-
(2003)
Applications That Participate in Their Own Defense (APOD)
-
-
Webber, F.1
Pal, P.P.2
Atighetchi, M.3
Jones, C.4
Rubel, P.5
-
4
-
-
48349127069
-
-
University of Wisconsin-Madison, Tech. Rep. 1577, August
-
J.-Y. Cai, V. Yegneswaran, C. Alfeld, and P. Barford, "Honeygames: A game theoretic approach to defending network monitors," University of Wisconsin-Madison, Tech. Rep. 1577, August 2006.
-
(2006)
Honeygames: A Game Theoretic Approach to Defending Network Monitors
-
-
Cai, J.-Y.1
Yegneswaran, V.2
Alfeld, C.3
Barford, P.4
-
5
-
-
85080758370
-
-
U. C. General, Report to the chairman committe on government operations, House of Representatives of the United States, May 1981
-
U. C. General, Report to the chairman committe on government operations, House of Representatives of the United States, May 1981.
-
-
-
-
7
-
-
85080732464
-
-
The Under Secretary of Defense for Acquisition Technology and Logistics, The Assistance Secretary of Defense for Networks and Information Integration, and DoD Chief Information Officer
-
The Under Secretary of Defense for Acquisition Technology and Logistics, The Assistance Secretary of Defense for Networks and Information Integration, and DoD Chief Information Officer, "Report on trusted defense systems," 2009.
-
(2009)
Report on Trusted Defense Systems
-
-
-
8
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and David, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
David3
-
9
-
-
68649100902
-
A break in the clouds towards a cloud definition
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds towards a cloud definition," SIGCOMM Computer Communication Review, pp. 137-150, 2009.
-
(2009)
SIGCOMM Computer Communication Review
, pp. 137-150
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
10
-
-
26444580931
-
Honeypot-based forensics
-
F. Pouget and M. Dacier, "Honeypot-based forensics," in AusCERT Asia Pacific Information Technology Security Conference, Brisbane, Australia, May 2004.
-
AusCERT Asia Pacific Information Technology Security Conference, Brisbane, Australia, May 2004
-
-
Pouget, F.1
Dacier, M.2
-
13
-
-
0003880013
-
-
Reading, Mass.: Addison-Wesley
-
E. Gamma, R. Helm, R. Johnson, and J. M. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software. Reading, Mass.: Addison-Wesley, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.M.4
|