Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Adversary work factor as a metric for information assurance
Proceedings of the 2000 workshop on New security paradigms
Computer
Validation of Sensor Alert Correlators
IEEE Security and Privacy
Determining the operational limits of an anomaly-based intrusion detector
IEEE Journal on Selected Areas in Communications
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Seeking the knowledge and means to more methodically detect, defend against, and better understand attacks on networked computer resources.