Author:
Brewer Russell,de Vel-Palumbo Melissa,Hutchings Alice,Holt Thomas,Goldsmith Andrew,Maimon David
Publisher
Springer International Publishing
Reference64 articles.
1. Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S., & Bajrami, G. (2016, June 28–July 1). Comparing detection capabilities of antivirus products: An empirical study with different versions of products from the same vendors. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) (pp. 48–53). IEEE.
https://doi.org/10.1109/DSN-W.2016.45
.
2. Atzeni, A., & Lioy, A. (2006). Why to adopt a security metric? A brief survey. In D. Gollmann, F. Massacci, & A. Yautsiukhin (Eds.), Quality of protection: Advances in information security (Vol. 23, pp. 1–12). Boston, MA: Springer.
https://doi.org/10.1007/978-0-387-36584-8_1
.
3. AV Comparatives. (2011). On demand detection of malicious software. Available at
https://www.av-comparatives.org/images/stories/test/ondret/avc_od_feb2011.pdf
. Accessed 15 June 2019.
4. Bace, R., & Mell, P. (2001). NIST special publication on intrusion detection systems. Retrieved from the Defense Technical Information Center (ADA393326).
5. Bell, J., & Burke, B. (1992). Cruising Cooper Street situational crime prevention: Successful case studies (2nd ed.). Guilderland, NY: Harrow and Heston.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献