Author:
Gao Jian-bo,Zhang Bao-wen,Chen Xiao-hua,Luo Zheng
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Igure V M, Willams R D. Taxonomies of attacks and vulnerabilities in computer systems [J]. IEEE Communications Surveys, 2008, 10(1): 6–19.
2. Howard J D, Longstaff T A. A common language for computer security incidents [R]. California: Sandia National Laboratories, 1998.
3. Alvarez G, Petrovic S. A taxonomy of Web attacks suitable for efficient encoding [J]. Computer & Security, 2003, 22(5): 435–449.
4. Hansman S, Hunt R. A taxonomy of network and computer attacks [J]. Computers & Security, 2005, 24(1): 31–43.
5. Simmons C, Ellis C, Shiva S, et al. AVOIDIT: A cyber attack taxonomy [R]. Memphis: University of Memphis, 2009.
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献