Publisher
Springer Nature Switzerland
Reference37 articles.
1. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 217–224. ACM (2002)
2. Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.: On optimal placement of intrusion detection modules in sensor networks. In: First International Conference on Broadband Networks, pp. 690–699. IEEE (2004)
3. Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: First International Conference on Availability, Reliability and Security (ARES’06), pp. 8-pp. IEEE (2006)
4. Communications in Computer and Information Science;GS Bopche,2019
5. Chen, H., Clark, J.A., Shaikh, S.A., Chivers, H., Nobles, P.: Optimising IDS sensor placement. In: 2010 International Conference on Availability, Reliability and Security, pp. 315–320. IEEE (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献