-
1
-
-
84947567130
-
-
Did stuxnet take out 1,000 centrifuges?, Washington, DC
-
D. Albright, P. Brannan, and, C. Walrond, Did stuxnet take out 1,000 centrifuges? Institute for Science and International Security, Washington, DC, 2010.
-
(2010)
Institute for Science and International Security
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
2
-
-
79953660412
-
An architectural systems engineering methodology for addressing cyber security
-
J.L. Bayuk, and, B.M. Horowitz, An architectural systems engineering methodology for addressing cyber security, Syst Eng 14 (2011), 294-304.
-
(2011)
Syst Eng 14
, pp. 294-304
-
-
Bayuk, J.L.1
Horowitz, B.M.2
-
3
-
-
48349127069
-
-
Technical Report 1577, University of Wisconsin, Madison
-
J. Cai, V. Yegneswaran, C. Alfeld, and, P. Barford, Honeygames: A game theoretic approach to defending network monitors, Technical Report 1577, University of Wisconsin, Madison, 2006.
-
(2006)
Honeygames: A Game Theoretic Approach to Defending Network Monitors
-
-
Cai, J.1
Yegneswaran, V.2
Alfeld, C.3
Barford, P.4
-
4
-
-
50249102797
-
Civitas: Toward a secure voting system
-
M., R. Clarkson, S. Chong, and, A.C. Myers, Civitas: Toward a secure voting system, IEEE Symp Security Privacy, 2008, pp. 354-368.
-
(2008)
IEEE Symp Security Privacy
, pp. 354-368
-
-
Clarkson, M.R.1
Chong, S.2
Myers, A.C.3
-
6
-
-
79960154013
-
-
Department of Defense, Washington, DC
-
DoD, The Under Secretary of Defense for Acquisition Technology and Logistics and The Assistant Secretary of Defense for Networks and Information Integration DoD Chief Information Officer, Report on trusted defense systems, Department of Defense, Washington, DC, 2009.
-
(2009)
DoD, the under Secretary of Defense for Acquisition Technology and Logistics and the Assistant Secretary of Defense for Networks and Information Integration DoD Chief Information Officer, Report on Trusted Defense Systems
-
-
-
7
-
-
78650062267
-
-
Mountain View, CA
-
N. Falliere, L.O. Murchu, and, E. Chien, W32.Stuxnet Dossier, Symantec, Mountain View, CA, 2011.
-
(2011)
W32.Stuxnet Dossier, Symantec
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
10
-
-
67349162622
-
Integrating cyber attacks within fault trees
-
I., N. Fovino, M. Masera, and, A.D. Cian, Integrating cyber attacks within fault trees, Reliab Eng Syst Safety 94 (2009), 1394-1402.
-
(2009)
Reliab Eng Syst Safety
, vol.94
, pp. 1394-1402
-
-
Fovino, I.N.1
Masera, M.2
Cian, A.D.3
-
11
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
A. Fujioka, and, T. Okamoto, A practical secret voting scheme for large scale elections, Adv Cryptol-AUSCRYPT' 92, 1992, pp. 244-251.
-
(1992)
Adv Cryptol-AUSCRYPT'
, vol.92
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
-
12
-
-
0010729284
-
-
2nd edition, Microsoft Press, Seattle, WA
-
M. Howard, Writing secure code, 2nd edition, Microsoft Press, Seattle, WA, 2002.
-
(2002)
Writing Secure Code
-
-
Howard, M.1
-
13
-
-
78649573321
-
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission) ISO/IEC 31010, Geneva, Switzerland
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Risk management-risk assessment techniques, ISO/IEC 31010, Geneva, Switzerland, 2009.
-
(2009)
Risk Management-risk Assessment Techniques
-
-
-
14
-
-
80051530371
-
System-Aware cyber security, itng, 2011 Eighth
-
R.A. Jones, and, B.M. Horowitz, System-Aware cyber security, itng, 2011 Eighth Int Conf Inform Technol New Generations, 2011, pp. 914-917.
-
(2011)
Int Conf Inform Technol New Generations
, pp. 914-917
-
-
Jones, R.A.1
Horowitz, B.M.2
-
16
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Oakland, CA
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and, S. Savage, Experimental security analysis of a modern automobile, IEEE Symp Security Privacy, Oakland, CA, 2010, pp. 447-462.
-
(2010)
IEEE Symp Security Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
17
-
-
84862780880
-
Defence Standard 00-56 Issue 4: Towards evidence-based safety standards
-
C. Menon, R. Hawkins, and, J. McDermid, Defence Standard 00-56 Issue 4: Towards evidence-based safety standards, Seventeenth Safety-Critical Syst Symp, 2009, pp. 223-243.
-
(2009)
Seventeenth Safety-Critical Syst Symp
, pp. 223-243
-
-
Menon, C.1
Hawkins, R.2
McDermid, J.3
-
19
-
-
3042810445
-
Recovering and examining computer forensic evidence
-
M.G. Noblett, M.M. Pollitt, and, L.A. Presely, Recovering and examining computer forensic evidence, Forensics Sci Commun 2 (4) (2000).
-
(2000)
Forensics Sci Commun
, vol.2
, Issue.4
-
-
Noblett, M.G.1
Pollitt, M.M.2
Presely, L.A.3
-
21
-
-
84862810566
-
-
CRC Press, Boca Raton, FL
-
B. Stackpole, and, P. Hanrion, Software deployment, updating, and patching, CRC Press, Boca Raton, FL, 2007.
-
(2007)
Software Deployment, Updating, and Patching
-
-
Stackpole, B.1
Hanrion, P.2
-
22
-
-
1842829828
-
-
Special Publication 800-03, NIST (National Institute of Standards and Technology), Gaithersburg, MD
-
G. Stoneburner, A. Goguen, and, A. Feringa, Risk management guide for information technology systems, Special Publication 800-03, NIST (National Institute of Standards and Technology), Gaithersburg, MD, 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
23
-
-
84862824574
-
-
Committee on Government Operations, House of Representatives of the United States, Washington, DC
-
US Comptroller General, Report to Chairman, Committee on Government Operations, House of Representatives of the United States, Washington, DC, 1981.
-
(1981)
US Comptroller General, Report to Chairman
-
-
-
24
-
-
68649100902
-
A break in the clouds towards a cloud definition
-
L.M. Vaquero, L. Rodero-Merino, J. Caceres, and, M. Lindner, A break in the clouds towards a cloud definition, SIGCOMM Comput Commun Rev 39 (2009), 137-150.
-
(2009)
SIGCOMM Comput Commun Rev
, vol.39
, pp. 137-150
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
25
-
-
80051512428
-
-
BBN Technologies, Cambridge, MA
-
F. Webber, P.P. Pal, M. Atighetchi, C. Jones, and, P. Rubel, Applications that participate in their own defense (APOD), BBN Technologies, Cambridge, MA, 2003.
-
(2003)
Applications That Participate in Their Own Defense (APOD)
-
-
Webber, F.1
Pal, P.P.2
Atighetchi, M.3
Jones, C.4
Rubel, P.5
-
26
-
-
72449180476
-
Reflections on cyber security
-
W.A. dWulf, and, A.K. Jones, Reflections on cyber security, Sci Mag 326 (2009), 943-944.
-
(2009)
Sci Mag
, vol.326
, pp. 943-944
-
-
Dwulf, W.A.1
Jones, A.K.2
|